IDEAS home Printed from https://ideas.repec.org/a/bla/jomstd/v44y2007i4p465-487.html
   My bibliography  Save this article

An Examination of the Factors that Influence Whether Newcomers Protect or Share Secrets of their Former Employers

Author

Listed:
  • David R. Hannah

Abstract

abstract This research investigated the factors that influence a decision that is often faced by employees who have made a transition from one organization to another: the decision about whether to protect secrets of their former employer or to share them with their new co‐workers. A total of 111 employees from two high‐tech companies participated in interviews. Their comments were analysed and, based on both relevant literature and the results of that analysis, a theory of the factors that influence newcomers' protect vs. share decisions was developed. According to that theory, newcomers first decide whether or not information is a trade secret of their former employer by considering (1) whether the information is part of their own knowledge, and (2) whether the information is publicly available, general, and negative (about something that did not work). If newcomers decide the information is a trade secret, they then evaluate (1) the degree to which their obligations are biased towards their former or new employer, and (2) the degree to which they identify more strongly with their former or new employer. Newcomers whose obligations and identifications are biased towards a new employer are more likely to share secrets. If these obligations and identifications are balanced, newcomers may share information in a way that allows them to believe they are fulfilling their responsibilities to both their former and their new employers.

Suggested Citation

  • David R. Hannah, 2007. "An Examination of the Factors that Influence Whether Newcomers Protect or Share Secrets of their Former Employers," Journal of Management Studies, Wiley Blackwell, vol. 44(4), pages 465-487, June.
  • Handle: RePEc:bla:jomstd:v:44:y:2007:i:4:p:465-487
    DOI: 10.1111/j.1467-6486.2007.00694.x
    as

    Download full text from publisher

    File URL: https://doi.org/10.1111/j.1467-6486.2007.00694.x
    Download Restriction: no

    File URL: https://libkey.io/10.1111/j.1467-6486.2007.00694.x?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. repec:dau:papers:123456789/5246 is not listed on IDEAS
    2. Hannah, David R. & McCarthy, Ian P. & Kietzmann, Jan, 2015. "We’re leaking, and everything's fine: How and why companies deliberately leak secrets," Business Horizons, Elsevier, vol. 58(6), pages 659-667.
    3. Delerue, Hélène & Lejeune, Albert, 2011. "Managerial secrecy and intellectual asset protection in SMEs: The role of institutional environment," Journal of International Management, Elsevier, vol. 17(2), pages 130-142, June.
    4. Bos, Brenda & Broekhuizen, Thijs L.J. & de Faria, Pedro, 2015. "A dynamic view on secrecy management," Journal of Business Research, Elsevier, vol. 68(12), pages 2619-2627.
    5. Kannan Srikanth & Anand Nandkumar & Deepa Mani & Prashant Kale, 2020. "How Firms Build Isolating Mechanisms for Knowledge: A Study in Offshore Research and Development Captives," Strategy Science, INFORMS, vol. 5(2), pages 98-116, June.
    6. Mills, Adam J., 2015. "Everyone loves a secret: Why consumers value marketing secrets," Business Horizons, Elsevier, vol. 58(6), pages 643-649.
    7. Robertson, Kirsten M. & Hannah, David R. & Lautsch, Brenda A., 2015. "The secret to protecting trade secrets: How to create positive secrecy climates in organizations," Business Horizons, Elsevier, vol. 58(6), pages 669-677.
    8. Hannah, David & Parent, Michael & Pitt, Leyland & Berthon, Pierre, 2014. "It's a secret: Marketing value and the denial of availability," Business Horizons, Elsevier, vol. 57(1), pages 49-59.
    9. Fedorenko, Ivan & Berthon, Pierre & Edelman, Linda, 2023. "Top secret: Integrating 20 years of research on secrecy," Technovation, Elsevier, vol. 123(C).
    10. David R. Hannah & Kirsten Robertson, 2015. "Why and How Do Employees Break and Bend Confidential Information Protection Rules?," Journal of Management Studies, Wiley Blackwell, vol. 52(3), pages 381-413, May.

    More about this item

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:bla:jomstd:v:44:y:2007:i:4:p:465-487. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Wiley Content Delivery (email available below). General contact details of provider: http://www.blackwellpublishing.com/journal.asp?ref=0022-2380 .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.