Author List: Jarvenpaa, Sirkka L.; Majchrzak, Ann;
Information Systems Research, 2010, Volume 21, Issue 4, Page 773-784.
Online participation engenders both the benefits of knowledge sharing and the risks of harm. Vigilant interaction in knowledge collaboration refers to an interactive emergent dialogue in which knowledge is shared while it is protected, requiring deep appraisals of each others' actions in order to determine how each action may influence the outcomes of the collaboration. Vigilant interactions are critical in online knowledge collaborations under ambivalent relationships where users collaborate to gain benefits but at the same time protect to avoid harm from perceived vulnerabilities. Vigilant interactions can take place on discussion boards, open source development, wiki sites, social media sites, and online knowledge management systems and thus is a rich research area for information systems researchers. Three elements of vigilant interactions are described: trust asymmetry, deception and novelty. Each of these elements challenges prevailing theory-based assumptions about how people collaborate online. The study of vigilant interaction, then, has the potential to provide insight on how these elements can be managed by participants in a manner that allows knowledge sharing to proceed without harm.
Keywords: deception; distrust; knowledge collaboration; novelty; online participation; trust; vigilance
Algorithm:

List of Topics

#245 0.163 knowledge sharing contribution practice electronic expertise individuals repositories management technical repository knowledge-sharing shared contributors novelty features peripheral share benefit seekers
#188 0.149 processes interaction new interactions temporal structure research emergent process theory address temporally core discussion focuses area underlying deep structures way
#258 0.099 information proximity message seeking perceived distance communication overload context geographic dispersed higher geographically task contexts recipient face-to-face temporal safe dyadic
#247 0.088 online evidence offline presence empirical large assurance likely effect seal place synchronous population sites friends increases isomorphism rewards drop intermediaries
#172 0.064 trust trusting study online perceived beliefs e-commerce intention trustworthiness relationships benevolence initial importance trust-building examines discussed building future context transactions
#294 0.059 development systems methodology methodologies information framework approach approaches paper analysis use presented applied assumptions based proposed described examines basis proposes
#269 0.055 participation activities different roles projects examined outcomes level benefits conditions key importance isd suggest situations contextual furthermore benefit levels focus
#56 0.050 information security interview threats attacks theory fear vulnerability visibility president vulnerabilities pmt behaviors enforcement appeals protection insiders attackers precautions vice