More effective transfer of competitor and customer intelligence: Mediating roles of common knowledge sharing and source credibility

Sirisuhk Rakthin, Roger J. Calantone, Seungho Choi

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

This research study examines the antecedents of competitor and customer intelligence transfer process between front-line and support personnel. Using structural equation analysis, the authors analyzed relationships among seven constructs-ties, motivation, supportive corporate culture, inter-departmental relationship, perception of common knowledge sharing, source credibility, and a transfer of competitor and customer intelligence. Hypotheses were tested among business executives and managers in four organizations in Thailand. The findings support the partially mediating effects of perception of common knowledge sharing and source credibility on a relationship between the antecedents and a transfer of competitor and customer intelligence.

Original languageEnglish
Title of host publicationKMIS 2012 - Proceedings of the International Conference on Knowledge Management and Information Sharing
Pages251-256
Number of pages6
StatePublished - 2012
Event4th International Conference on Knowledge Management and Information Sharing, KMIS 2012 - Barcelona, Spain
Duration: 4 Oct 20127 Oct 2012

Publication series

NameKMIS 2012 - Proceedings of the International Conference on Knowledge Management and Information Sharing

Conference

Conference4th International Conference on Knowledge Management and Information Sharing, KMIS 2012
Country/TerritorySpain
CityBarcelona
Period4/10/127/10/12

Keywords

  • Competitor intelligence
  • Corporate culture
  • Customer intelligence
  • Inter-departmental relationship
  • Motivation
  • Perception of common knowledge sharing
  • Source credibility
  • Ties

Fingerprint

Dive into the research topics of 'More effective transfer of competitor and customer intelligence: Mediating roles of common knowledge sharing and source credibility'. Together they form a unique fingerprint.

Cite this