\documentclass[11pt,twoside]{article}\makeatletter

\IfFileExists{xcolor.sty}%
  {\RequirePackage{xcolor}}%
  {\RequirePackage{color}}
\usepackage{colortbl}
\usepackage{wrapfig}
\usepackage{ifxetex}
\ifxetex
  \usepackage{fontspec}
  \usepackage{xunicode}
  \catcode`⃥=\active \def⃥{\textbackslash}
  \catcode`❴=\active \def❴{\{}
  \catcode`❵=\active \def❵{\}}
  \def\textJapanese{\fontspec{Noto Sans CJK JP}}
  \def\textChinese{\fontspec{Noto Sans CJK SC}}
  \def\textKorean{\fontspec{Noto Sans CJK KR}}
  \setmonofont{DejaVu Sans Mono}
  
\else
  \IfFileExists{utf8x.def}%
   {\usepackage[utf8x]{inputenc}
      \PrerenderUnicode{–}
    }%
   {\usepackage[utf8]{inputenc}}
  \usepackage[english]{babel}
  \usepackage[T1]{fontenc}
  \usepackage{float}
  \usepackage[]{ucs}
  \uc@dclc{8421}{default}{\textbackslash }
  \uc@dclc{10100}{default}{\{}
  \uc@dclc{10101}{default}{\}}
  \uc@dclc{8491}{default}{\AA{}}
  \uc@dclc{8239}{default}{\,}
  \uc@dclc{20154}{default}{ }
  \uc@dclc{10148}{default}{>}
  \def\textschwa{\rotatebox{-90}{e}}
  \def\textJapanese{}
  \def\textChinese{}
  \IfFileExists{tipa.sty}{\usepackage{tipa}}{}
\fi
\def\exampleFont{\ttfamily\small}
\DeclareTextSymbol{\textpi}{OML}{25}
\usepackage{relsize}
\RequirePackage{array}
\def\@testpach{\@chclass
 \ifnum \@lastchclass=6 \@ne \@chnum \@ne \else
  \ifnum \@lastchclass=7 5 \else
   \ifnum \@lastchclass=8 \tw@ \else
    \ifnum \@lastchclass=9 \thr@@
   \else \z@
   \ifnum \@lastchclass = 10 \else
   \edef\@nextchar{\expandafter\string\@nextchar}%
   \@chnum
   \if \@nextchar c\z@ \else
    \if \@nextchar l\@ne \else
     \if \@nextchar r\tw@ \else
   \z@ \@chclass
   \if\@nextchar |\@ne \else
    \if \@nextchar !6 \else
     \if \@nextchar @7 \else
      \if \@nextchar (8 \else
       \if \@nextchar )9 \else
  10
  \@chnum
  \if \@nextchar m\thr@@\else
   \if \@nextchar p4 \else
    \if \@nextchar b5 \else
   \z@ \@chclass \z@ \@preamerr \z@ \fi \fi \fi \fi
   \fi \fi  \fi  \fi  \fi  \fi  \fi \fi \fi \fi \fi \fi}
\gdef\arraybackslash{\let\\=\@arraycr}
\def\@textsubscript#1{{\m@th\ensuremath{_{\mbox{\fontsize\sf@size\z@#1}}}}}
\def\Panel#1#2#3#4{\multicolumn{#3}{){\columncolor{#2}}#4}{#1}}
\def\abbr{}
\def\corr{}
\def\expan{}
\def\gap{}
\def\orig{}
\def\reg{}
\def\ref{}
\def\sic{}
\def\persName{}\def\name{}
\def\placeName{}
\def\orgName{}
\def\textcal#1{{\fontspec{Lucida Calligraphy}#1}}
\def\textgothic#1{{\fontspec{Lucida Blackletter}#1}}
\def\textlarge#1{{\large #1}}
\def\textoverbar#1{\ensuremath{\overline{#1}}}
\def\textquoted#1{‘#1’}
\def\textsmall#1{{\small #1}}
\def\textsubscript#1{\@textsubscript{\selectfont#1}}
\def\textxi{\ensuremath{\xi}}
\def\titlem{\itshape}
\newenvironment{biblfree}{}{\ifvmode\par\fi }
\newenvironment{bibl}{}{}
\newenvironment{byline}{\vskip6pt\itshape\fontsize{16pt}{18pt}\selectfont}{\par }
\newenvironment{citbibl}{}{\ifvmode\par\fi }
\newenvironment{docAuthor}{\ifvmode\vskip4pt\fontsize{16pt}{18pt}\selectfont\fi\itshape}{\ifvmode\par\fi }
\newenvironment{docDate}{}{\ifvmode\par\fi }
\newenvironment{docImprint}{\vskip 6pt}{\ifvmode\par\fi }
\newenvironment{docTitle}{\vskip6pt\bfseries\fontsize{22pt}{25pt}\selectfont}{\par }
\newenvironment{msHead}{\vskip 6pt}{\par}
\newenvironment{msItem}{\vskip 6pt}{\par}
\newenvironment{rubric}{}{}
\newenvironment{titlePart}{}{\par }

\newcolumntype{L}[1]{){\raggedright\arraybackslash}p{#1}}
\newcolumntype{C}[1]{){\centering\arraybackslash}p{#1}}
\newcolumntype{R}[1]{){\raggedleft\arraybackslash}p{#1}}
\newcolumntype{P}[1]{){\arraybackslash}p{#1}}
\newcolumntype{B}[1]{){\arraybackslash}b{#1}}
\newcolumntype{M}[1]{){\arraybackslash}m{#1}}
\definecolor{label}{gray}{0.75}
\def\unusedattribute#1{\sout{\textcolor{label}{#1}}}
\DeclareRobustCommand*{\xref}{\hyper@normalise\xref@}
\def\xref@#1#2{\hyper@linkurl{#2}{#1}}
\begingroup
\catcode`\_=\active
\gdef_#1{\ensuremath{\sb{\mathrm{#1}}}}
\endgroup
\mathcode`\_=\string"8000
\catcode`\_=12\relax

\usepackage[a4paper,twoside,lmargin=1in,rmargin=1in,tmargin=1in,bmargin=1in,marginparwidth=0.75in]{geometry}
\usepackage{framed}

\definecolor{shadecolor}{gray}{0.95}
\usepackage{longtable}
\usepackage[normalem]{ulem}
\usepackage{fancyvrb}
\usepackage{fancyhdr}
\usepackage{graphicx}
\usepackage{marginnote}

\renewcommand{\@cite}[1]{#1}


\renewcommand*{\marginfont}{\itshape\footnotesize}

\def\Gin@extensions{.pdf,.png,.jpg,.mps,.tif}

  \pagestyle{fancy}

\usepackage[pdftitle={Socio -Technical Determinants of Knowledge Sharing Behaviour-An Investigation on Social Networking Sites users},
 pdfauthor={}]{hyperref}
\hyperbaseurl{}

	 \paperwidth210mm
	 \paperheight297mm
              
\def\@pnumwidth{1.55em}
\def\@tocrmarg {2.55em}
\def\@dotsep{4.5}
\setcounter{tocdepth}{3}
\clubpenalty=8000
\emergencystretch 3em
\hbadness=4000
\hyphenpenalty=400
\pretolerance=750
\tolerance=2000
\vbadness=4000
\widowpenalty=10000

\renewcommand\section{\@startsection {section}{1}{\z@}%
     {-1.75ex \@plus -0.5ex \@minus -.2ex}%
     {0.5ex \@plus .2ex}%
     {\reset@font\Large\bfseries}}
\renewcommand\subsection{\@startsection{subsection}{2}{\z@}%
     {-1.75ex\@plus -0.5ex \@minus- .2ex}%
     {0.5ex \@plus .2ex}%
     {\reset@font\Large}}
\renewcommand\subsubsection{\@startsection{subsubsection}{3}{\z@}%
     {-1.5ex\@plus -0.35ex \@minus -.2ex}%
     {0.5ex \@plus .2ex}%
     {\reset@font\large}}
\renewcommand\paragraph{\@startsection{paragraph}{4}{\z@}%
     {-1ex \@plus-0.35ex \@minus -0.2ex}%
     {0.5ex \@plus .2ex}%
     {\reset@font\normalsize}}
\renewcommand\subparagraph{\@startsection{subparagraph}{5}{\parindent}%
     {1.5ex \@plus1ex \@minus .2ex}%
     {-1em}%
     {\reset@font\normalsize\bfseries}}


\def\l@section#1#2{\addpenalty{\@secpenalty} \addvspace{1.0em plus 1pt}
 \@tempdima 1.5em \begingroup
 \parindent \z@ \rightskip \@pnumwidth 
 \parfillskip -\@pnumwidth 
 \bfseries \leavevmode #1\hfil \hbox to\@pnumwidth{\hss #2}\par
 \endgroup}
\def\l@subsection{\@dottedtocline{2}{1.5em}{2.3em}}
\def\l@subsubsection{\@dottedtocline{3}{3.8em}{3.2em}}
\def\l@paragraph{\@dottedtocline{4}{7.0em}{4.1em}}
\def\l@subparagraph{\@dottedtocline{5}{10em}{5em}}
\@ifundefined{c@section}{\newcounter{section}}{}
\@ifundefined{c@chapter}{\newcounter{chapter}}{}
\newif\if@mainmatter 
\@mainmattertrue
\def\chaptername{Chapter}
\def\frontmatter{%
  \pagenumbering{roman}
  \def\thechapter{\@roman\c@chapter}
  \def\theHchapter{\roman{chapter}}
  \def\thesection{\@roman\c@section}
  \def\theHsection{\roman{section}}
  \def\@chapapp{}%
}
\def\mainmatter{%
  \cleardoublepage
  \def\thechapter{\@arabic\c@chapter}
  \setcounter{chapter}{0}
  \setcounter{section}{0}
  \pagenumbering{arabic}
  \setcounter{secnumdepth}{6}
  \def\@chapapp{\chaptername}%
  \def\theHchapter{\arabic{chapter}}
  \def\thesection{\@arabic\c@section}
  \def\theHsection{\arabic{section}}
}
\def\backmatter{%
  \cleardoublepage
  \setcounter{chapter}{0}
  \setcounter{section}{0}
  \setcounter{secnumdepth}{2}
  \def\@chapapp{\appendixname}%
  \def\thechapter{\@Alph\c@chapter}
  \def\theHchapter{\Alph{chapter}}
  \appendix
}
\newenvironment{bibitemlist}[1]{%
   \list{\@biblabel{\@arabic\c@enumiv}}%
       {\settowidth\labelwidth{\@biblabel{#1}}%
        \leftmargin\labelwidth
        \advance\leftmargin\labelsep
        \@openbib@code
        \usecounter{enumiv}%
        \let\p@enumiv\@empty
        \renewcommand\theenumiv{\@arabic\c@enumiv}%
	}%
  \sloppy
  \clubpenalty4000
  \@clubpenalty \clubpenalty
  \widowpenalty4000%
  \sfcode`\.\@m}%
  {\def\@noitemerr
    {\@latex@warning{Empty `bibitemlist' environment}}%
    \endlist}

\def\tableofcontents{\section*{\contentsname}\@starttoc{toc}}
\parskip0pt
\parindent1em
\def\Panel#1#2#3#4{\multicolumn{#3}{){\columncolor{#2}}#4}{#1}}
\newenvironment{reflist}{%
  \begin{raggedright}\begin{list}{}
  {%
   \setlength{\topsep}{0pt}%
   \setlength{\rightmargin}{0.25in}%
   \setlength{\itemsep}{0pt}%
   \setlength{\itemindent}{0pt}%
   \setlength{\parskip}{0pt}%
   \setlength{\parsep}{2pt}%
   \def\makelabel##1{\itshape ##1}}%
  }
  {\end{list}\end{raggedright}}
\newenvironment{sansreflist}{%
  \begin{raggedright}\begin{list}{}
  {%
   \setlength{\topsep}{0pt}%
   \setlength{\rightmargin}{0.25in}%
   \setlength{\itemindent}{0pt}%
   \setlength{\parskip}{0pt}%
   \setlength{\itemsep}{0pt}%
   \setlength{\parsep}{2pt}%
   \def\makelabel##1{\upshape ##1}}%
  }
  {\end{list}\end{raggedright}}
\newenvironment{specHead}[2]%
 {\vspace{20pt}\hrule\vspace{10pt}%
  \phantomsection\label{#1}\markright{#2}%

  \pdfbookmark[2]{#2}{#1}%
  \hspace{-0.75in}{\bfseries\fontsize{16pt}{18pt}\selectfont#2}%
  }{}
      \def\TheFullDate{2019-01-15 (revised: 15 January 2019)}
\def\TheID{\makeatother }
\def\TheDate{2019-01-15}
\title{Socio -Technical Determinants of Knowledge Sharing Behaviour-An Investigation on Social Networking Sites users}
\author{}\makeatletter 
\makeatletter
\newcommand*{\cleartoleftpage}{%
  \clearpage
    \if@twoside
    \ifodd\c@page
      \hbox{}\newpage
      \if@twocolumn
        \hbox{}\newpage
      \fi
    \fi
  \fi
}
\makeatother
\makeatletter
\thispagestyle{empty}
\markright{\@title}\markboth{\@title}{\@author}
\renewcommand\small{\@setfontsize\small{9pt}{11pt}\abovedisplayskip 8.5\p@ plus3\p@ minus4\p@
\belowdisplayskip \abovedisplayskip
\abovedisplayshortskip \z@ plus2\p@
\belowdisplayshortskip 4\p@ plus2\p@ minus2\p@
\def\@listi{\leftmargin\leftmargini
               \topsep 2\p@ plus1\p@ minus1\p@
               \parsep 2\p@ plus\p@ minus\p@
               \itemsep 1pt}
}
\makeatother
\fvset{frame=single,numberblanklines=false,xleftmargin=5mm,xrightmargin=5mm}
\fancyhf{} 
\setlength{\headheight}{14pt}
\fancyhead[LE]{\bfseries\leftmark} 
\fancyhead[RO]{\bfseries\rightmark} 
\fancyfoot[RO]{}
\fancyfoot[CO]{\thepage}
\fancyfoot[LO]{\TheID}
\fancyfoot[LE]{}
\fancyfoot[CE]{\thepage}
\fancyfoot[RE]{\TheID}
\hypersetup{citebordercolor=0.75 0.75 0.75,linkbordercolor=0.75 0.75 0.75,urlbordercolor=0.75 0.75 0.75,bookmarksnumbered=true}
\fancypagestyle{plain}{\fancyhead{}\renewcommand{\headrulewidth}{0pt}}

\date{}
\usepackage{authblk}

\providecommand{\keywords}[1]
{
\footnotesize
  \textbf{\textit{Index terms---}} #1
}

\usepackage{graphicx,xcolor}
\definecolor{GJBlue}{HTML}{273B81}
\definecolor{GJLightBlue}{HTML}{0A9DD9}
\definecolor{GJMediumGrey}{HTML}{6D6E70}
\definecolor{GJLightGrey}{HTML}{929497} 

\renewenvironment{abstract}{%
   \setlength{\parindent}{0pt}\raggedright
   \textcolor{GJMediumGrey}{\rule{\textwidth}{2pt}}
   \vskip16pt
   \textcolor{GJBlue}{\large\bfseries\abstractname\space}
}{%   
   \vskip8pt
   \textcolor{GJMediumGrey}{\rule{\textwidth}{2pt}}
   \vskip16pt
}

\usepackage[absolute,overlay]{textpos}

\makeatother 
      \usepackage{lineno}
      \linenumbers
      
\begin{document}

             \author[1]{Jakia  Sultana}

             \author[2]{Md. Aminul  Islam}

             \author[3]{Md. Fahami Ahsan  Mazmum}

\renewcommand\Authands{ and }

\date{\small \em Received: 13 December 2018 Accepted: 2 January 2019 Published: 15 January 2019}

\maketitle


\begin{abstract}
        


Social Networking is a buzzword in modern communication for eradicating the distance barrier. Due to the advancement in Information and Communication Technology, peoples can communicate with each other from anywhere in anytime. Different way of communication tools exits; Social networking is one of them. Through social networking, users can share their thinking, values, emotions, insights and so on with others. However, their behaviour of the social networking sites (SNS) users is influenced by different factors. This paper aims at identifying those determinants, specially the sociotechnical determinants of knowledge sharing behaviour among the user of SNS. Structural equation modelling (SEM) was conducted on the primary data collected through the survey. Therefore, the outcome of this study shows that ethical culture, social ties, sense of belonging, knowledge selfefficacy, information privacy and structural assurance are all significant variables as socio-technical factors. This study provides a guideline to the different group of people likemarketers, employers who need to understand the knowledge sharing behaviour of the SNS users.

\end{abstract}


\keywords{socio-technical, determinants, social networking, knowledge-sharing behaviour.}

\begin{textblock*}{18cm}(1cm,1cm) % {block width} (coords) 
\textcolor{GJBlue}{\LARGE Global Journals \LaTeX\ JournalKaleidoscope\texttrademark}
\end{textblock*}

\begin{textblock*}{18cm}(1.4cm,1.5cm) % {block width} (coords) 
\textcolor{GJBlue}{\footnotesize \\ Artificial Intelligence formulated this projection for compatibility purposes from the original article published at Global Journals. However, this technology is currently in beta. \emph{Therefore, kindly ignore odd layouts, missed formulae, text, tables, or figures.}}
\end{textblock*}


\let\tabcellsep& 	 	 		 
\section[{Introduction}]{Introduction}\par
n this day and age, people are getting more involved in virtual world through their presence in social networking sites (SNS). Online users of various sites consider networking online as a convenient media of sharing thoughts and knowledge. People in online communicate with their friends, family, neighbours and even strangers. By the grace of these online networking sites, people get scope to interact with one another in more convenient way then the previous. People from diverse geographical area with similar interest can communicate with each other through online networking \hyperref[b1]{(Brown \& Duguid, 2001)}. Social networking sites become more popular because of high level social presence and self-disclosure \hyperref[b21]{(Kaplan \& Haenlein, 2010)}. Currently, popular social networking sites are-Facebook, twitter, LinkedIn, Instagram, Snapchat, Flickr, WhatsApp etc. \hyperref[b25]{(Maina, 2018)}. Through this SNS people share their views, idea, insights which derived from the implicit and explicit knowledge they process \hyperref[b13]{(Hakami et al., 2014)}.Knowledge sharing among people enhanced through the emerged online tools, like-Social Network, Blogs, Wikis and Podcast Forums \hyperref[b13]{(Hakami et al., 2014)}.\par
According to \hyperref[b0]{Aliakbar et al. (2012)}, knowledge sharing is the process by which knowledge is transferred and exchanged among people. \hyperref[b35]{Pulakos et al., (2003)}believes that knowledge sharing is not limited to transfer and exchange but sharing thoughts to solve problem and developing ides also included in knowledge sharing. This knowledge sharing may be influenced by various types of factors; social, technical, personal etc. In this paper socio-technical determinants of knowledge sharing are given concentration. Socio-technical determinants refers to users social background regarding knowledge acquire, thought, views and its interaction with technical system like SNS (IGI, 2018). These socio-technical factors can affect the knowledge sharing which leads to knowledge gap among communities. So if the socio-technical determinants can be identified, the way of knowledge sharing will be accelerated, which ultimately reduced knowledge gap with proper knowledge, among the communities. For this purpose this paper will focus on socio-technical issue on knowledge sharing behaviour where variable of each factor will be identified by reviewing literature. Later, quantitative analysis is conducted to determine the core variable on social and technical sector. The research question of this study is-What are the sociotechnical determinants of knowledge sharing behaviour among social networking sites user? This paper includes six parts. First part provide introduction of this paper. In the second part, literature review has been described. Third part discusses the methodology. Data analysis and discussion has been shown in forth part. Fifth part includes the integrated findings. In the last part, conclusion of this paper has been given. 
\section[{II.}]{II.} 
\section[{Literature Review}]{Literature Review}\par
The term 'Socio-technical' use to emphasis the connections between the social and the technical factors to understand particular technology or behaviour in the organization \hyperref[b45]{(Trist, 1963)}. In socio-technical system, social and technical factors interact and impact each other for a particular process or output. \hyperref[b33]{(Pasmore et al., 1982)}. According to \hyperref[b7]{Davenport \& Prusak (2000)}, if only technological factors are considered, proper knowledge sharing behaviour cannot be determined, as knowledge sharing behaviour is a social process which impacted by social factors. To understand the knowledge sharing in SNS, both social and technical factors are necessary for investigation. Therefore, this study focused on the socio-technical determinants of the knowledge sharing behaviour in SNS.\par
In the modern age, the uses of SNS as a form of communication and knowledge sharing is increasing at a high speed and the times lapse between per visit also gradually reducing. Some researchers used quantitative analysis to identify the determinants of knowledge sharing behaviour while others used qualitative approach. A study by \hyperref[b43]{Tan (2013)} found that the main determinants of successful knowledge sharing behaviour are Social ties, knowledge self-efficacy, structural assurance and system quality. As a social factors ethical culture, social tie, and a sense of belonging in online network and as a technical factors structural assurance of service providers and structural assurance of the Internet have been identified by \hyperref[b3]{Chai \& kim (2012)}. However, these studies focused on particular demographic area, different age group can provide different outcome. Therefore, more quantitative studies need to conduct on diverse group of people for more generalizable outcome.\par
Different researchers used different theories to analyse the knowledge behaviour of the SNS users. A study to analyse knowledge sharing behaviour by \hyperref[b18]{Hsua et al. (2007)} proposed a social cognitive theory (SCT)based model which mainly focused on trust, selfefficacy, and outcome expectations. According to study by \hyperref[b32]{Paroutis \& Saleh (2009)} history, outcome expectation, perceived organizational and management support and trust are four key variable of knowledge sharing with the use of web 2.0 technologies. Social factors, like-trust, reciprocity, social network ties were founded along with other personal and organizational factor by \hyperref[b4]{Chen \& Hew (2015)}.Share willingness, trust, reciprocity and altruism identified as main variables in a proposed model based on social exchange theory of knowledge sharing behaviours in virtual communities by \hyperref[b19]{Jinyang (2015)}. A study by \hyperref[b26]{Majali et al. (2016)} identified that reciprocity and sense of community play vital role in knowledge sharing behaviour where trust considered as insignificant one. However, they ignored technical and other factors that might have impact on knowledge sharing behaviour as well. Information Privacy and Social Ties are considered initially as determinants in a technological category in knowledge sharing behaviour, however finally social ties identified as a leading variable in knowledge sharing in social media \hyperref[b13]{(Hakami et al., 2014)}. Studies conducted by Tohidinia \& Mosakhani (2010) and \hyperref[b3]{Chai \& kim (2012)} identified that social ties is positively correlated with the knowledge sharing behaviour. Previous study by \hyperref[b46]{Wang \& Wei (2011)} indicates that sense of belongings does not have high positive correlation relation with the knowledge sharing behaviour, where absence of direct relationship is considerate as moderating variable. Self-efficacy impacts positively in knowledge sharing behaviour, which is identified in a study conducted by \hyperref[b48]{Zhang \& Ng (2012)}. \hyperref[b14]{Hara \& Hew (2007)} conducted a research study where, structural assurance considered as positively correlated with knowledge sharing behaviour. Considering all the previous research, this study considered some social and technical factor as sociotechnical determinants of knowledge sharing behaviour. 
\section[{a) Research Dimension and Hypothesis Developed}]{a) Research Dimension and Hypothesis Developed}\par
Reviewing the literature and considering the outcome of the previous studies, variables are identified for study in two sectors, one is social and another one is technical. In social sector the variables are-ethical culture (EC), social ties (ST), sense of belonging (SB), knowledge self-efficacy (KSE). In technical sector the variables are-information privacy (IP), structural assurance (SA). 
\section[{Ethical Culture}]{Ethical Culture}\par
Ethical culture refers to the moral value that is injected to the individual \hyperref[b15]{(Hawker, 2002)}. \hyperref[b15]{Hawker (2002)} said that ethics is a moral value and principle while Pai \& Arnott (2013) defined ethics in Social Networking Sites (SNSs) as access control and privacy control of information. \hyperref[b3]{Chai \& kim (2012)} mentioned that the ethical culture is becoming imperative in recent days because of the widespread use of technology. In this consequence, the quality of information sharing in SNSs is very essential as a medium or platform for knowledge sharing. \hyperref[b8]{Devito (2009)} emphasized on politeness while communicating in SNSs towards other individuals and mutual respect to one another. \hyperref[b27]{Matthews \& Stephens (2010)} marked that ethical culture is important to seek the truth. Although there is high usage of SNSs which makes ethical culture much important, we need to avoid circulation of false information also. Based on this discussion following hypothesis emerged-H1: Ethical culture (EC) has a significant effect on KSB. 
\section[{Social Ties}]{Social Ties}\par
Social ties indicate the closeness between or among users in SNSs (Chaia \& kim, 2012,). \hyperref[b6]{Chow \& Chan (2008)} highlighted that social ties is the degree of contact that is maintained with other members in the SNSs. Several researchers  {\ref (Hsu et al., 2007;}\hyperref[b6]{Chow \& Chan, 2008)}shows that stronger social ties between or among users in SNSs increase the Knowledge Sharing (KS) behaviour. \hyperref[b16]{He et al. (2009)} also indicated that the degree of Knowledge Sharing (KS) may vary on the basis of the degree of social ties. So, higher social ties make higher KS in SNSs. \hyperref[b46]{Wang \& Wei (2011)} supported that trust is an essential segment of social ties which help build up the strong relationship among the participants or individuals. Moreover, the time spent in SNSs has contributory effect to make social relationship between users \hyperref[b3]{(Chai \& kim, 2012)}. Therefore, following hypothesis is developed-H2: Social ties (ST) has a significant effect on KSB. 
\section[{Sense of Belonging}]{Sense of Belonging}\par
Lin (2008) defined sense of belonging as a selfrealization of being as an individual within the specific community. He added that it defines the relationship for sense of belonging with Knowledge Sharing. \hyperref[b22]{Lin (2008)} suggested that the higher the degree of belonging an individual has, the greater the chances for sharing knowledge.  {\ref Chiu}  Based on the discussion following hypothesis emerged-H3: Sense of belonging (SB) has a significant effect on KSB. 
\section[{Knowledge Self-efficacy}]{Knowledge Self-efficacy}\par
Hakami et al. (  {\ref 2014})) perceived that self-efficacy has high relationship to knowledge sharing behaviour. It is assumed that people with high self-efficacy believe that their owned knowledge will benefit others and they are more willing to share \hyperref[b44]{(Tohidinia, 2010)}. Knowledge self-efficacy, as believing that, an individual knowledge has the ability to solve problems as well as to make better decisions \hyperref[b24]{(Luthans, 2003)}. Therefore, this study has considered knowledge self-efficacy to have an effect on KSB H4: Knowledge self-efficacy(KSE) has a significant effect on KSB 
\section[{Information Privacy}]{Information Privacy}\par
The wish of individuals to manage or have some influence over data about themselves is called information privacy. Information technology's advances have increased the concern information privacy and its impacts. As a result, researchers of information systems have started to explore information privacy issues, along with technical solutions to focus these concerns \hyperref[b11]{(France \& Robert, 2011)}. Information Privacy is an individual's claim to control personal information-information identifiable to the individual-is acquired, disclosed or used \hyperref[b20]{(Kang, 1998)}. The ability of users' like-individuals, groups or institutions to decide when, how, and to what extent their information is shared to others is called information privacy. Information privacy refers to restricted access to private information in internet and is a significant reason for user participating in social networking sites \hyperref[b40]{(Snyder \& Slauson, 2006)}. H5: Information privacy(IP) has a significant effect on KSB. 
\section[{Structural Assurance}]{Structural Assurance}\par
Defensive arrangements such as securities, laws, lawful recourses and promises, that are used for promoting transactional success is called structural assurance. For example, there are different legal and technological internet and websites safeguards that are attached with the internet or website. These protective measures secure the internet and website users from privacy loss, identity loss, credit card fraud or any other criminal activities that could happen on the internet. This is usually known as structural assurance To make feeling safe the internet and websites users in their sharing of knowledge is the objective of structural assurance. If the service providers and the internet can't provide necessary structural assurance ,it will play negative role in stimulating knowledge sharing behaviours \hyperref[b10]{(Evangelou \& Karacapilidis, 2005)}. Moreover, in electronic marketing, structural assurance has acted an important role in forming trust \hyperref[b34]{(Pavlou, 2002)}. Customers' belief while making decision on which e-vendors to use is influenced by strong structural assurance provided by these e-vendors. \hyperref[b12]{(Gefen et al., 2003)}. Thus, for maintaining knowledge sharing, structural assurance is taken as major element \hyperref[b42]{(So \& Bolloju, 2005)}. In SNSs, structural assurance is known as the internet's structure that ensures user a protected environment \hyperref[b3]{(Chai \& Kim, 2012)}. Performance promises, rules, regulations, and legal assurance are the terms of this structure. \hyperref[b30]{McKnight et al.(2002)} specified that that structural assurance is the protection of SNSs' users from criminal and fraud activities and also from the prevention of loss of privacy and individual identity. As for example, SNSs users must be able to make their information open to the public or limited to certain users and every SNS should provide such kind of options \hyperref[b43]{(Tan, 2013)}. \hyperref[b14]{Hara \& Hew, (2007)} indicated that structural assurance is positively related to knowledge sharing behaviour in SNSs. \hyperref[b36]{Ribbink et al., (2004)} found that structural assurance have positive impact on the internet use and internet trust. Therefore, following hypothesis emerged-H6: Structural assurance(SA) has a significant effect on KSB.\par
People can and do encounter unpredicted reprimand or even discharge from their positions because of unsuitable actions as a result. According to Chou \& Liao (2013) in case of knowledge sharing in social media, information privacy has a significant impact. So, Information privacy is considered in this study, so following hypothesis emerged- The measurement construct of the variables taken for this study are developed based on the discussion above. Considering the nature and core facts of each variable the items are taken for this study. This study considered new items rather than the previous one to represent the core theme of the variables, because the previous items were not self-exploratory. As survey method was used, so self-exploratory items will provide more quality data \hyperref[b9]{(Duffy et al., 2005)}. However, the new items were developed through changing and modifying the items of \hyperref[b3]{Chai \& kim (2012)}   
\section[{Methodology}]{Methodology}\par
Both primary and secondary data have been used to answer the research question of this study. For secondary data, various relevant research articles, journals, books, periodicals, magazines have been reviewed. A semi-structured questionnaire has been prepared to collect primary data. A Google form has been used to prepare this questionnaire. The link of this form has been shared with respondents to collect this data. There are various thoughts regarding the sample size. According to \hyperref[b47]{Wang \& Wang (2018)} in order to conduct structural equation modelling (SEM) sample size of more than 150 would be better, whereas \hyperref[b37]{Roscoe (1975)} argued that total number of items on the study provide the base for calculating sample size. Moreover for collecting good sample size questionnaire link was sent to 270 people. Out of 270, 242 responses have been received thus the response rate is 89.63\%. Therefore, the collected responses show a good sample size for conducting the SEM.At first the reliability of the constructs were tested through Cronbach's alpha reliability analysis. Afterwards, a confirmatory factor analysis was conducted in AMOS (version 22) on both measurement model and structural model. The outcome of the CFA provides the base from testing the model fitness of measurement model and also for the testing the hypotheses. 
\section[{IV.}]{IV.} 
\section[{Data Analysis and Discussion}]{Data Analysis and Discussion} 
\section[{a) Demographic Analysis}]{a) Demographic Analysis}\par
In our study, out of 242 respondents 54.1\% and 45.9\% are male and female respectively. In case of age group, 76.4\% people grouped into 20-24 years where .4\% people are from 40-44 years. Most of the respondents are students which is responsible for 86\% of the total response. Among the participants, all have more or less experience in using social networking sites. But 122 participants out of 242 mentioned that they have 4-6 years of experience in this regard. It is needed to refer that 35.5\% spent 3-4 hours per day (where less than 1 hour usage rate is 6.6\% and more than 14 hours rate is .4\%) in social networking sites.  
\section[{b) Reliability Analysis}]{b) Reliability Analysis}\par
Before conducting the confirmatory factor analysis (CFA) through Structural equation modelling (SEM) the reliability of the construct need to be tested through the cronbach alpha reliability analysis. Following provide the details of the reliability analysis. From the reliability statistics (Table \hyperref[tab_3]{3}), the value of Cronbach's alpha coefficient for the 16 items is .835. It means that these items have comparatively high internal consistency. The last column of item-total statistics table \hyperref[tab_4]{(Table 4}) entitled 'Cronbach's alpha if item deleted' measures probable value of the Cronbach's alpha, if it is needed to get rid of a particular item. So, from the item-total statistic stable, it is obvious that that none of the values of the column of 'Cronbach's alpha if item deleted' is greater than the current alpha of the whole scale: .835. This indicates that it is not necessary to delete any items. Hence, to measure all construct consistency, the survey questionnaire can be taken as a trustworthy tool. 
\section[{c) Model fitness measures}]{c) Model fitness measures}\par
After checking the reliability of the constructs, a measurement model was developed in AMOS  {\ref (version 22)} in order to test the fitness of the model. To test the model of this study, structural equation modelling (SEM) was used as SEM test the relationship among the variables through confirmatory factor analysis \hyperref[b2]{(Byrne, 2016)}   V. 
\section[{Implication}]{Implication}\par
This study provides a theoretical contribution on the area of studies relating to social networking and knowledge sharing. This study also shows the significance of the taken factors to the knowledge sharing behaviour. Social and technical factors that are taken into consideration in this study turned significant, which implies that not only social factors but also technical factors affect the knowledge sharing behaviour of SNS users. Whereas, previous studies showed social factors more significant than the technological factors \hyperref[b3]{(Chai \& kim, 2012)}. As a methodological contribution, this study shows construct reliability of the newly developed items through reliability analysis and model fitness measures. This study also implies some practical contribution, the outcome of this information provide good insight about the social media users behaviour and the underlying feeding factors which ultimately provide guidance to various group of people (i.e. marketers, organizations focus group, employers etc.) who needs to deal with the behavioural psychology of the SNS users. The output information is also useful to the social networking platform provider to develop, improve and make it interactive through understanding their needs. In order to provide social networking platform to particular community and group, platform provider should consider the offline developed social factors because along with technical factors, as those offline social factors also impact the online behaviour. 
\section[{VI.}]{VI.} 
\section[{Limitation and Future Focus}]{Limitation and Future Focus}\par
This study counted several limitations; firstly, this study is cross-sectional, so the long term relationship between the factors cannot be confirmed by this study. Therefore, in future longitudinal studies can be conducted. Secondly, this study didn't test the master validity of the measurement items, which implies that convergent and divergent validity of the newly developed measurement items cannot be confirmed. In future, these validities can be tested to make the items more generalizable. Thirdly, this study used two items for Knowledge Self-Efficacy and structural assurance; however use of more items can robust the outcome for generalization as researcher recommend use of at least three items of reflecting a factor \hyperref[b17]{(Hair et al., 2010)}. 
\section[{VII.}]{VII.} 
\section[{Conclusion}]{Conclusion}\par
In the nutshell, this study aimed to research the socio-technical determinants of the knowledge sharing behaviour of SNS users. To find the answer of the research question this study collected data on the developed items of each factors taken from the previous literature. A SEM was conducted which leads to the outcome of this study. All the considered factors; ethical culture, social ties, sense of belonging, knowledge selfefficacy, information privacy and structural assurance are found as significant factors behind the knowledge sharing behaviour of the SNS users. The finding of this research contributes theoretically, methodologically and practically. A manager can use this paper for getting ideas and make decision on how social networking is used for the organizational engagement along with to realize the factors of social networking engagement. Researchers may find valuable and interesting factors that were previously less prioritized but with the sequence of time those factors are getting more importance.  \begin{figure}[htbp]
\noindent\textbf{} \par 
\begin{longtable}{}
\end{longtable} \par
 
\caption{\label{tab_0}}\end{figure}
 \begin{figure}[htbp]
\noindent\textbf{1} \par 
\begin{longtable}{P{0.07040816326530612\textwidth}P{0.7795918367346939\textwidth}}
Constructs\tabcellsep Related items\\
\tabcellsep EC-1: I think individual values is important in knowledge sharing\\
\tabcellsep behaviour\\
Ethical Culture (EC)\tabcellsep EC-2: I do believe that individual norms play a vital role in knowledge sharing behaviour\\
\tabcellsep EC-3: Individual morality has great impact on knowledge sharing\\
\tabcellsep behaviour\\
\tabcellsep ST-1: Trust to followers shapes knowledge sharing behaviour\\
\tabcellsep ST-2: Time one spent in virtual world is judgmental in knowledge\\
Social Ties (ST)\tabcellsep sharing attitude\\
\tabcellsep ST-3: Frequency of people interaction is one of the vital components in\\
\tabcellsep knowledge sharing Attitude\\
\tabcellsep SB-1: One belongs to a particular group sometimes shape one\\
\tabcellsep behavioural pattern in sharing knowledge\\
Sense of Belonging (SB)\tabcellsep SB-2: Commitment level to a particular group in knowledge sharing is note worthy SB-3: Comfort level to share his/her thoughts and opinions is very\\
\tabcellsep crucial in knowledge sharing trend\end{longtable} \par
 
\caption{\label{tab_1}Table 1 :}\end{figure}
 \begin{figure}[htbp]
\noindent\textbf{2} \par 
\begin{longtable}{P{0.18963254593175854\textwidth}P{0.2587926509186352\textwidth}P{0.10262467191601049\textwidth}P{0.2989501312335958\textwidth}}
Descriptions\tabcellsep \tabcellsep Frequency\tabcellsep Percentage\\
Gender\tabcellsep Male Female\tabcellsep 131 111\tabcellsep 54.1\% 45.9\%\\
\tabcellsep 15-19\tabcellsep 6\tabcellsep 2.5\%\\
\tabcellsep 20-24\tabcellsep 185\tabcellsep 76.4\%\\
\tabcellsep 25-29\tabcellsep 36\tabcellsep 14.9\%\\
Age\tabcellsep 30-34 35-39\tabcellsep 7 2\tabcellsep 2.9\% .8\%\\
\tabcellsep 40-44\tabcellsep 1\tabcellsep .4\%\\
\tabcellsep 45-49\tabcellsep 3\tabcellsep 1.2\%\\
\tabcellsep Above 49\tabcellsep 2\tabcellsep .8\%\\
\tabcellsep Student\tabcellsep 208\tabcellsep 86\%\\
\tabcellsep Teacher/Faculty\tabcellsep 14\tabcellsep 5.8\%\\
\tabcellsep Engineer\tabcellsep 3\tabcellsep 1.2\%\\
Profession\tabcellsep Business\tabcellsep 8\tabcellsep 3.3\%\\
\tabcellsep Doctor\tabcellsep 3\tabcellsep 1.2\%\\
\tabcellsep Others\tabcellsep 6\tabcellsep 2.5\%\\
Experience in Using Social Networking Sites (In years)\tabcellsep 1-3 4-6 7-9\tabcellsep 63 122 43\tabcellsep 26.0\% 50.4\% 17.8\%\\
\tabcellsep \tabcellsep \tabcellsep © 2019 Global Journals\end{longtable} \par
 
\caption{\label{tab_2}Table 2 :}\end{figure}
 \begin{figure}[htbp]
\noindent\textbf{3} \par 
\begin{longtable}{P{0.16649484536082473\textwidth}P{0.5783505154639176\textwidth}P{0.10515463917525773\textwidth}}
\tabcellsep Reliability Statistics\tabcellsep \\
Cronbach's\tabcellsep Cronbach's\tabcellsep N of Items\\
Alpha\tabcellsep Alpha Based\tabcellsep \\
\tabcellsep on\tabcellsep \\
\tabcellsep Standardized\tabcellsep \\
\tabcellsep Items\tabcellsep \\
.835\tabcellsep .844\tabcellsep 16\end{longtable} \par
 
\caption{\label{tab_3}Table 3 :}\end{figure}
 \begin{figure}[htbp]
\noindent\textbf{4} \par 
\begin{longtable}{P{0.29896551724137926\textwidth}P{0.13385057471264367\textwidth}P{0.12212643678160919\textwidth}P{0.11333333333333333\textwidth}P{0.08890804597701149\textwidth}P{0.09281609195402299\textwidth}}
\tabcellsep \tabcellsep \tabcellsep Item-Total Statistics\tabcellsep \tabcellsep \\
\tabcellsep Scale Mean if\tabcellsep Scale Variance if\tabcellsep Corrected Item-Total\tabcellsep Squared Multiple\tabcellsep Cronbach's Alpha if\\
\tabcellsep Item Deleted\tabcellsep Item Deleted\tabcellsep Correlation\tabcellsep Correlation\tabcellsep Item Deleted\\
EC\textunderscore 1\tabcellsep 63.6186\tabcellsep 47.309\tabcellsep .348\tabcellsep .248\tabcellsep .831\\
EC\textunderscore 2\tabcellsep 63.6864\tabcellsep 47.671\tabcellsep .347\tabcellsep .305\tabcellsep .831\\
EC\textunderscore 3\tabcellsep 63.6864\tabcellsep 46.599\tabcellsep .392\tabcellsep .253\tabcellsep .829\\
ST\textunderscore 1\tabcellsep 64.2203\tabcellsep 45.151\tabcellsep .436\tabcellsep .298\tabcellsep .827\\
ST\textunderscore 2\tabcellsep 64.4280\tabcellsep 46.348\tabcellsep .315\tabcellsep .274\tabcellsep .834\\
ST\textunderscore 3\tabcellsep 63.9661\tabcellsep 45.939\tabcellsep .414\tabcellsep .254\tabcellsep .828\\
SB\textunderscore 1\tabcellsep 64.0085\tabcellsep 46.340\tabcellsep .417\tabcellsep .238\tabcellsep .828\\
SB\textunderscore 2\tabcellsep 64.2585\tabcellsep 45.461\tabcellsep .373\tabcellsep .220\tabcellsep .831\\
SB\textunderscore 3\tabcellsep 63.9195\tabcellsep 45.802\tabcellsep .372\tabcellsep .238\tabcellsep .830\\
KSE\textunderscore 1\tabcellsep 63.8093\tabcellsep 45.815\tabcellsep .472\tabcellsep .305\tabcellsep .825\\
KSE\textunderscore 2\tabcellsep 64.2246\tabcellsep 45.017\tabcellsep .483\tabcellsep .319\tabcellsep .824\\
SA\textunderscore 1\tabcellsep 64.0381\tabcellsep 43.782\tabcellsep .568\tabcellsep .444\tabcellsep .819\\
SA\textunderscore 2\tabcellsep 64.2246\tabcellsep 45.154\tabcellsep .395\tabcellsep .267\tabcellsep .830\\
IP\textunderscore 1\tabcellsep 63.7500\tabcellsep 44.810\tabcellsep .485\tabcellsep .424\tabcellsep .824\\
IP\textunderscore 2\tabcellsep 64.2881\tabcellsep 44.844\tabcellsep .447\tabcellsep .309\tabcellsep .826\\
IP\textunderscore 3\tabcellsep 63.6780\tabcellsep 45.326\tabcellsep .502\tabcellsep .433\tabcellsep .823\end{longtable} \par
 
\caption{\label{tab_4}Table 4 :}\end{figure}
 \begin{figure}[htbp]
\noindent\textbf{} \par 
\begin{longtable}{P{0.5405529953917051\textwidth}P{0.3094470046082949\textwidth}}
significance level (p-value), Comparative fit index (CFI),\tabcellsep et al., 2010). The estimated value of the measurement\\
Standardized root-mean-square residual (SRMR) and\tabcellsep model of this study shows excellent model fitness in\\
Root Mean Square Error of Approximation (RMSEA)(Hair\tabcellsep comparison to the threshold value (shows in table-5).\\
Year 2019\tabcellsep \\
12\tabcellsep \\
Volume XIX Issue II Version I\tabcellsep \\
( )\tabcellsep \\
Global Journal of Management and Business Research\tabcellsep \\
© 2019 Global Journals 1\tabcellsep \end{longtable} \par
 
\caption{\label{tab_5}}\end{figure}
 \begin{figure}[htbp]
\noindent\textbf{5} \par 
\begin{longtable}{P{0.200968992248062\textwidth}P{0.1449612403100775\textwidth}P{0.1251937984496124\textwidth}P{0.21414728682170542\textwidth}P{0.14825581395348839\textwidth}P{0.01647286821705426\textwidth}}
Measure\tabcellsep Estimate\tabcellsep Threshold\tabcellsep Interpretation\tabcellsep \tabcellsep \\
CMIN\tabcellsep 119.330\tabcellsep --\tabcellsep --\tabcellsep Cut-off\tabcellsep \\
DF\tabcellsep 87\tabcellsep --\tabcellsep --\tabcellsep \multicolumn{2}{l}{criteria taken}\\
CMIN/DF\tabcellsep 1.372\tabcellsep ? 3\tabcellsep Excellent\tabcellsep \multicolumn{2}{l}{from (Hair et}\\
CFI SRMR RMSEA\tabcellsep 0.951 0.051 0.040\tabcellsep >0.95 <0.08 <0.06\tabcellsep Excellent Excellent Excellent\tabcellsep al., p.654)\tabcellsep 2010,\\
PClose\tabcellsep 0.833\tabcellsep >0.05\tabcellsep Excellent\tabcellsep \tabcellsep \\
d) Hypothesis Testing\tabcellsep \tabcellsep \tabcellsep \tabcellsep \tabcellsep \end{longtable} \par
 
\caption{\label{tab_6}Table 5 :}\end{figure}
 \begin{figure}[htbp]
\noindent\textbf{6} \par 
\begin{longtable}{P{0.15\textwidth}P{0.1676470588235294\textwidth}P{0.1764705882352941\textwidth}P{0.17352941176470588\textwidth}P{0.1823529411764706\textwidth}}
Hypothesis\tabcellsep Path\tabcellsep Standardized path coefficient (Beta)\tabcellsep T-statistics\tabcellsep Decision\\
H1\tabcellsep EC -> KSB\tabcellsep .247\tabcellsep 6.286***\tabcellsep Supported\\
H2\tabcellsep ST -> KSB\tabcellsep .264\tabcellsep 6.652***\tabcellsep Supported\\
H3\tabcellsep SB -> KSB\tabcellsep .128\tabcellsep 3.014**\tabcellsep Supported\\
H4\tabcellsep KSA -> KSB\tabcellsep .212\tabcellsep 5.050***\tabcellsep Supported\\
H5\tabcellsep IP-> KSB\tabcellsep .179\tabcellsep 4.846***\tabcellsep Supported\\
H6\tabcellsep SA ->KSB\tabcellsep .208\tabcellsep 4.187***\tabcellsep Supported\\
\multicolumn{2}{l}{Note: ***p < 0.001, ** P<0.05}\tabcellsep \tabcellsep \tabcellsep \end{longtable} \par
 
\caption{\label{tab_7}Table 6 :}\end{figure}
 			\footnote{Socio -Technical Determinants of Knowledge Sharing Behaviour-An Investigation on Social NetworkingSites users} 			\footnote{© 2019 Global Journals} 		 		\backmatter  			  				\begin{bibitemlist}{1}
\bibitem[Maina (2018)]{b25}\label{b25} 	 		\textit{},  		 			A Maina 		.  		 \url{https://smallbiztrends.com/2016/05/popular-social-media-sites.html}  		2018. June 2018. p. 30.  	 
\bibitem[Hakami et al. ()]{b13}\label{b13} 	 		‘A Review of Factors Affecting the Sharing of Knowledge in Social Media’.  		 			Y Hakami 		,  		 			S Tam 		,  		 			A H Busalim 		,  		 			A R C Husin 		.  	 	 		\textit{Science International}  		2014. 26  (2)  p. .  	 
\bibitem[Chai and Kim ()]{b3}\label{b3} 	 		‘A socio-technical approach to knowledge contribution behavior: An empirical investigation of social networking sites users’.  		 			S Chai 		,  		 			M Kim 		.  	 	 		\textit{International Journal of Information Management}  		2012. Elsevier. 32  (2)  p. .  	 
\bibitem[Pi et al. ()]{b39}\label{b39} 	 		‘A study of Facebook Groups members' knowledge sharing’.  		 			S.-M Pi 		,  		 			C.-H Chou 		,  		 			H.-L Liao 		.  	 	 		\textit{Computers in Human Behavior}  		2013. 29 p. .  	 
\bibitem[Zhang and Ng ()]{b48}\label{b48} 	 		‘Attitude toward knowledge sharing in construction teams’.  		 			P H Zhang 		,  		 			F F Ng 		.  	 	 		\textit{Industrial Management \& Data Systems}  		2012. 112  (9)  p. .  	 
\bibitem[Hawker ()]{b15}\label{b15} 	 		\textit{Color Oxford Dictionary. Thesaurus and Wordpower Guide},  		 			S Hawker 		.  		2002.  	 
\bibitem[Ribbink et al. ()]{b36}\label{b36} 	 		‘Comfort your online customer: quality, trust and loyalty on the internet’.  		 			D Ribbink 		,  		 			A C R V Riel 		,  		 			V Liljander 		,  		 			S Streukens 		.  	 	 		\textit{Managing Service Quality}  		2004. 14  (6)  p. .  	 
\bibitem[Duffy et al. ()]{b9}\label{b9} 	 		‘Comparing data from online and face-to-face surveys’.  		 			B Duffy 		,  		 			K Smith 		,  		 			G Terhanian 		,  		 			J Bremer 		.  	 	 		\textit{International Journal of Market Research}  		2005. 47  (6)  p. .  	 
\bibitem[Aliakbar et al. ()]{b0}\label{b0} 	 		‘Determinants of Knowledge Sharing Behavior’.  		 			E Aliakbar 		,  		 			R B M Yusoff 		,  		 			N H N Mahmood 		.  	 	 		\textit{2012 International Conference on Economics, Business and Marketing Management},  				 (Singapore)  		2012. 2012. IACSIT Press.  	 
\bibitem[Paroutis and Saleh ()]{b32}\label{b32} 	 		‘Determinants of knowledge sharing using web 2.0 technologies’.  		 			S Paroutis 		,  		 			Saleh 		.  	 	 		\textit{Journal of knowledge management}  		2009. 13  (4)  p. .  	 
\bibitem[Lin ()]{b22}\label{b22} 	 		‘Determinants of successful virtual communities’.  		 			H F Lin 		.  	 	 		\textit{Contributions from system characteristics and social factors. Information and Management},  				2008. p. .  	 
\bibitem[Tan and Melaka ()]{b43}\label{b43} 	 		‘Determinants of successfull knowledge sharing behavior in social networking sites’.  		 			C N L Tan 		,  		 			Melaka 		.  	 	 		\textit{Journal of Knowledge Management Practice}  		2013. 14  (3) .  	 
\bibitem[Mcknight et al. ()]{b30}\label{b30} 	 		‘Developing and validating trust measures for e-commerce: An integrative typology’.  		 			D Mcknight 		,  		 			V Choudhury 		,  		 			C Kacmar 		.  	 	 		\textit{Information Systems Research}  		2002. 13 p. .  	 
\bibitem[So and Bolloju ()]{b42}\label{b42} 	 		‘Explaining the intentions to share and reuse knowledge in the context of IT service operations’.  		 			J So 		,  		 			N Bolloju 		.  	 	 		\textit{Journal of Knowledge Management}  		2005. 9 p. .  	 
\bibitem[Roscoe (ed.) ()]{b37}\label{b37} 	 		\textit{Fundamental Research Statistics for the Behavioral Sciences},  		 			J T Roscoe 		.  		Holt, Rinehart and Winston (ed.)  		1975.  	 	 (2nd ed) 
\bibitem[Kang ()]{b20}\label{b20} 	 		‘Information privacy in cyberspace transactions’.  		 			J Kang 		.  	 	 		\textit{Stanford Law Review}  		1998. 50  (4)  p. .  	 
\bibitem[Information Systems Education Conference, Dallas]{b41}\label{b41} 	 		 \url{http://proc.isecon.org/2006/3333/ISECON.2006.Snyder.pdf}  		\textit{Information Systems Education Conference, Dallas},  				p. .  	 
\bibitem[Pavlou ()]{b34}\label{b34} 	 		‘Institution-based trust in interorganizational exchange relationships: The role of online B2B marketplaces on trust formation’.  		 			P A Pavlou 		.  	 	 		\textit{The Journal of Strategic Information Systems}  		2002. 11 p. .  	 
\bibitem[Brown and Duguid ()]{b1}\label{b1} 	 		‘Knowledge and organization: A social-practice perspective’.  		 			J S Brown 		,  		 			P Duguid 		.  		 \xref{http://dx.doi.org/10.1287/orsc.12.2.198.10116}{10.1287/orsc.12.2.198.10116}.  		 \url{http://dx.doi.org/10.1287/orsc.12.2.198.10116}  	 	 		\textit{Organization science}  		2001. 12  (2)  p. .  	 
\bibitem[Majali and Bohari ()]{b26}\label{b26} 	 		‘Knowledge Contribution Determinants through Social Network Sites: Social Relational Perspective’.  		 			T A Majali 		,  		 			A M Bohari 		.  	 	 		\textit{International Review of Management and Marketing}  		2016. 6  (3) .  	 
\bibitem[Shen et al. ()]{b38}\label{b38} 	 		‘Knowledge contribution in virtual communities: accounting for multiple dimensions of social presence through social identity’.  		 			K N Shen 		,  		 			A Y Yu 		,  		 			M Khalifa 		.  	 	 		\textit{Behaviour and Information Technology}  		2010. p. .  	 
\bibitem[Hsua et al. ()]{b18}\label{b18} 	 		‘Knowledge sharing behavior in virtual communities: The relationship between trust, selfefficacy, and outcome expectations’.  		 			M.-H Hsua 		,  		 			T L Jub 		,  		 			C.-H Yenc 		,  		 			C.-M Changa 		.  	 	 		\textit{International Journal of Human-Computer Studies}  		2007. 65  (2)  p. .  	 
\bibitem[Tohidinia and Mosakhani ()]{b44}\label{b44} 	 		\textit{Knowledge sharing behaviour and its predictors. Industrial management and Data systems},  		 			Z Tohidinia 		,  		 			M Mosakhani 		.  		2010. 110 p. .  	 
\bibitem[Jinyang (2015)]{b19}\label{b19} 	 		‘Knowledge Sharing in Virtual Communities: A Social Exchange Theory Perspective’.  		 			L Jinyang 		.  	 	 		\textit{Journal of Industrial Engineering and Management}  		March 2015. p. .  	 
\bibitem[Chen and Hew ()]{b4}\label{b4} 	 		‘Knowledge Sharing in Virtual Distributed Environments: Main Motivators, Discrepancies of Findings and Suggestions for Future Research’.  		 			Y Chen 		,  		 			K F Hew 		.  	 	 		\textit{International Journal of Information and Education Technology}  		2015.  (6)  p. 5.  	 
\bibitem[Wang and Wei ()]{b46}\label{b46} 	 		‘Knowledge sharing in wiki communities: an empirical study’.  		 			W T Wang 		,  		 			Z H Wei 		.  	 	 		\textit{Online Information Review}  		2011. 35  (5)  p. .  	 
\bibitem[Hara and Hew ()]{b14}\label{b14} 	 		‘Knowledge-sharing in an online community of health-care professionals’.  		 			N Hara 		,  		 			K F Hew 		.  	 	 		\textit{Information Technology \& People}  		2007. 20  (3)  p. .  	 
\bibitem[Pulakos et al. (ed.) ()]{b35}\label{b35} 	 		\textit{Managing knowledge for sustained competitive advantage: Designing strategies for effective human resource management},  		 			E D Pulakos 		,  		 			D W Dorsey 		,  		 			W C Borman 		.  		S.E. Jackson, M.A. Hitt \& A.S. DeNisi (ed.)  		2003. San Francisco: Jossey Bass. p. .  	 	 (Hiring for knowledge-based competition, m.k) 
\bibitem[Hair et al. ()]{b17}\label{b17} 	 		\textit{Multivariate data analysis},  		 			J Hair 		,  		 			W Black 		,  		 			B Babin 		,  		 			R Anderson 		.  		2010. Upper Saddle River, NJ, USA: Prentice-Hall.  	 	 (7th ed) 
\bibitem[Snyder et al. ()]{b40}\label{b40} 	 		\textit{Myspace.com-A social networking site and social contract theory},  		 			J Snyder 		,  		 			D Carpenter 		,  		 			G J Slauson 		.  		2006. 2006.  	 	 (Paper presented at the) 
\bibitem[Evangelou and Karacapilidis ()]{b10}\label{b10} 	 		‘On the interaction between humans and knowledge management systems: A framework of knowledge sharing catalysts’.  		 			C Evangelou 		,  		 			N Karacapilidis 		.  	 	 		\textit{Knowledge Management in Research and Practice}  		2005. 3 p. .  	 
\bibitem[Wang and Wang (2018)]{b47}\label{b47} 	 		\textit{Oreilly},  		 			X Wang 		,  		 			J Wang 		.  		 \url{https://www.oreilly.com/library/view/structural-equation-modeling/9781118356302/c07anchor-1.html}  		2018. Accessed 21 July 2018.  	 
\bibitem[Trist ()]{b45}\label{b45} 	 		\textit{Organizational choice-capabilities of groups at the coal face under changing technologies : the loss, rediscovery \& transformation of a work tradition},  		 			E L Trist 		.  		1963. London: Tavistock.  	 
\bibitem[Luthans ()]{b24}\label{b24} 	 		\textit{Positive organizational behaviour: developing and managing psychological strengths},  		 			F Luthans 		.  		2003. Academy of Management Executive. p. .  	 
\bibitem[France and Robert ()]{b11}\label{b11} 	 		‘Privacy in the digital age: a review of information privacy research in information systems’.  		 			B France 		,  		 			C E Robert 		.  	 	 		\textit{MIS Quarterly}  		2011. 35  (4)  p. .  	 
\bibitem[Matthews and Stephens ()]{b27}\label{b27} 	 		‘Sociable knowledge sharing online: philosophy, patterns and intervention’.  		 			P Matthews 		,  		 			R Stephens 		.  	 	 		\textit{Aslib Proceedings},  		Aslib Proceedings  		2010. p. .  	 
\bibitem[Chow and Chan ()]{b6}\label{b6} 	 		‘Social network, social trust and shared goals in organizational knowledge sharing’.  		 			W S Chow 		,  		 			L S Chan 		.  	 	 		\textit{Information \& Management}  		2008. p. .  	 
\bibitem[He et al. ()]{b16}\label{b16} 	 		‘Social relationship and its role in knowledge management systems usage’.  		 			W He 		,  		 			Q Qiao 		,  		 			K K Wei 		.  	 	 		\textit{Information \& management}  		2009. p. .  	 
\bibitem[Pasmore et al. ()]{b33}\label{b33} 	 		‘Social technical systems: A North American reflection on empirical studies of the seventies’.  		 			W Pasmore 		,  		 			C Francis 		,  		 			A Shani 		.  	 	 		\textit{Human Relations}  		1982. 35  (12)  p. .  	 
\bibitem[Byrne ()]{b2}\label{b2} 	 		\textit{Structural Equation Modeling With AMOS},  		 			B Byrne 		.  		2016. New York: Routledge.  	 
\bibitem[Devito ()]{b8}\label{b8} 	 		\textit{The communication blog: Politeness and Verbal Messages},  		 			J A Devito 		.  		 \url{http://tcbdevito.blogspot.com/2009/02/politeness-and-verbal-messages.html}  		2009.  	 
\bibitem[Gefen et al. ()]{b12}\label{b12} 	 		‘Trust and TAM in online shopping: An integrated model’.  		 			D Gefen 		,  		 			E Karahanna 		,  		 			D Straub 		.  	 	 		\textit{MIS Quarterly}  		2003. 27 p. .  	 
\bibitem[Chiu et al. ()]{b5}\label{b5} 	 		‘Understanding knowledge sharing in virtual communities: An integration of expectancy disconfirmation and justice theories’.  		 			C M Chiu 		,  		 			E T Wang 		,  		 			F J Shih 		,  		 			Y W Fan 		.  	 	 		\textit{Online Information Review}  		2011. p. .  	 
\bibitem[Lee ()]{b23}\label{b23} 	 		\textit{Understanding music sharing behaviour on social network services. Online Information Review},  		 			D Lee 		.  		2011. p. .  	 
\bibitem[Pai and Arnott ()]{b31}\label{b31} 	 		‘User adoption of social networking sites: Eliciting uses and gratifications through a means-end approach’.  		 			P Pai 		,  		 			D C Arnott 		.  	 	 		\textit{Computers in Human Behavior}  		2013. p. .  	 
\bibitem[Kaplan and Haenlein ()]{b21}\label{b21} 	 		‘Users of the world, unite! The challenges and opportunities of Social Media’.  		 			A Kaplan 		,  		 			M Haenlein 		.  	 	 		\textit{Business Horizons},  				2010. p. .  	 
\bibitem[Mcknight and Chervany ()]{b28}\label{b28} 	 		‘What is Trust? A conceptual analysis and an interdisciplinary model’.  		 			D H Mcknight 		,  		 			N L Chervany 		.  	 	 		\textit{AMCIS 2000 Proceedings},  				2000.  	 
\bibitem[Mcknight and Chervany ()]{b29}\label{b29} 	 		‘What trust means in e-commerce customer relationships: An interdisciplinary conceptual typology’.  		 			D Mcknight 		,  		 			N Chervany 		.  	 	 		\textit{International Journal of Electronic Commerce}  		2001. 6 p. .  	 
\bibitem[Davenport and Prusak ()]{b7}\label{b7} 	 		\textit{Working Knowledge: How organizations manage what they know},  		 			T H Davenport 		,  		 			L Prusak 		.  		2000. Boston: Harvard Business School Press.  	 
\end{bibitemlist}
 			 		 	 
\end{document}
