Next Article in Journal
An Extended Fama-French Multi-Factor Model in Direct Real Estate Investing
Next Article in Special Issue
The Determinants of Immigrants’ Skill Composition
Previous Article in Journal
A Fourier Interpolation Method for Numerical Solution of FBSDEs: Global Convergence, Stability, and Higher Order Discretizations
Previous Article in Special Issue
Breaking Cournot: The Effects of Capacity-Adjusting Technology
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Analysing Drivers of Knowledge Leakage in Collaborative Agreements: A Magnetic Processing Case Firm

Department of Business Administration, Tallinn University of Technology, Ehitajate tee 5, 19086 Tallinn, Estonia
*
Author to whom correspondence should be addressed.
J. Risk Financial Manag. 2022, 15(9), 389; https://doi.org/10.3390/jrfm15090389
Submission received: 6 August 2022 / Revised: 30 August 2022 / Accepted: 30 August 2022 / Published: 1 September 2022
(This article belongs to the Special Issue Business Performance)

Abstract

:
Due to the embeddedness of organisations in networks, collaborations, and business relationships, knowledge leakage has become a common concern. In this regard, this paper aims to investigate drivers of knowledge leakage in collaborative agreements using an integrated ISM-MICMAC model. Based on insights from employees including the CEO of a magnetic processing firm, we validate the proposed model. The findings of our study reveal nine key drivers that influence knowledge leakage in collaborative agreements. In terms of level of influence, incomplete contract is the most influential driver, followed by sub-contracting activities. Last, the nine drivers are classified into two main clusters: independency cluster—weak dependence power with high driving power—and linkage cluster—strong dependence and driving power.

1. Introduction

The uncertain business landscape, where continuous updating of knowledge is essential for securing a sustained competitive advantage (Durst 2020; Yang et al. 2021), underscores the importance of collaboration among organisations even more. By establishing a collaborative agreement—which is essentially an agreement between organisations to work together to achieve a mutually beneficial objective—organisations can align their resources to create new knowledge and remain competitive (Papadas et al. 2019; Pateman et al. 2016; Zhou et al. 2022). Collaboration among organisation is indisputable as a crucial ingredient to successfully realising projects (Bond-Barnard et al. 2018), particularly when each partner possesses complementary resources that are rare and unique (Belderbos et al. 2015). It has been shown that when organisations collaborate, projects can be accomplished more effectively and efficiently because they are able to overcome individual limitations in ability and resources that would otherwise impede the execution or completion of projects.
Despite the fact that collaborations have many advantages, there is also a dark side. A possible dark side to collaboration arises from the exchange of information or knowledge, the very basis of collaboration (Garousi Mokhtarzadeh et al. 2021; Scaliza et al. 2022). It is this bidirectional flow of knowledge that can cause valuable organisational knowledge to seep out with the wrong persons. This phenomenon is often referred to as “knowledge leakage”. As defined by Frishammar et al. (2015), knowledge leakage is the disclosure of valuable knowledge that is supposed to remain within the boundaries of an organisation. In the context of collaboration, knowledge leakage can also result from firms misappropriating valuable knowledge of a focal firm in an inter-organisational framework. Typically, this happens when partners develop opportunistic behaviour in pursuit of self-interest and are less willing to cooperate (Jiang et al. 2013).
Although it is evident from the literature on collaborations that knowledge sharing and knowledge creation have received considerably more attention (e.g., Goi et al. 2022; Ho and Ganesan 2013; Kleber et al. 2019), research on knowledge leakage, in general, is relatively growing (Durst et al. 2015). Previous studies (e.g., Ahlfänger et al. 2022; Fawad Sharif et al. 2022; Jiang et al. 2016; Oxley and Sampson 2004; Raza-Ullah 2021) on knowledge leakage in collaboration (be it, e.g., strategic alliances or coopetition) have largely focused on governance control mechanisms, such as formal and informal contracts (i.e., social contract based on trust). These mechanisms have been used primarily for controlling and minimising knowledge leakage in different forms of collaboration. As an example, Fawad Sharif et al. (2022) analyse how distrust, partner learning intent, and human resource management influence knowledge leakage in collaborative projects. In a strategic alliance, Jiang et al. (2016) examine the links between partners’ trustworthiness and knowledge leakage. Besides the fact that knowledge leakage is not a fully understood phenomenon yet, previous research has provided limited insights into the factors that may cause knowledge leakage in collaborative settings (Li and Kang 2019). Consequently, there is little evidence of identifying and modelling the interactions between the drivers of knowledge leakage, particularly in collaborative settings. This gap in the literature is worth addressing for important reasons. First and foremost, to have a better understanding of this fragmented research field (Durst et al. 2015). A second consideration is that, since it appears that knowledge leakage is intrinsically a complex phenomenon (Durst et al. 2015; Wu et al. 2021), a deeper understanding of knowledge leakage within the context of collaborative agreements, as a complex social system, can also be developed. In specific terms, addressing this gap is imperative, as it would provide a clearer picture of this complexity issue that is often only hinted at (Wang et al. 2021; Wayne Gould 2012; Wu et al. 2021) which in turn is important for the further development of knowledge leakage as an important element of both (knowledge) risk management and knowledge management in general (Zieba et al. 2022).
Therefore, this study proposes an integrated interpretive structural modelling (ISM)—Cross-Impact Matrix Multiplication Applied to Classification (MICMAC) model to investigate drivers of knowledge leakage in collaborative agreements and establish their interrelationships. Specifically, the research objectives are as follows:
  • To identify key drivers of knowledge leakage in collaborative agreements;
  • To establish hierarchical relationships among the drivers;
  • To classify the drivers based on their driving and dependency power; and
  • To validate the model using a magnetic processing firm as a case study.
The following justifies the selection of a magnetic processing firm as the subject of the case study. The firm is a small and privately-owned enterprise that specialises in magnetic processing, using high-tech to develop non-assembled and highly customised products for its clients. The industry is competitive, as acknowledged by an employee from the case firm, it also forms part of a global supply chain network, positioning the firm in a more complex environment. This poses a greater threat regarding knowledge leakage (Durst and Ferenhof 2014; Durst et al. 2015; Oxley and Wada 2009). Additionally, due to its small size, the firm faces the problem of liability of smallness, making it heavily dependent on its partners, suppliers and clients, which increases the possibility of knowledge leakage thus making the selected firm an appropriate study subject.
The first research objective is achieved by conducting a thorough literature review, based on peer-reviewed scientific papers, and further validated by the opinions of employees from the case firm. The second research objective is achieved by using the ISM technique, which is widely used to establish interrelationships between complex variables (Ali et al. 2022; Singh et al. 2019). The third objective of the research is addressed using MICMAC analysis. MICMAC has been deemed an effective analysis tool for classifying variables into distinct clusters with unique characteristics (Jung et al. 2021). Finally, the fourth objective is reached through the continued involvement of the employees including the CEO of the case firm.
To this end, this research contributes in several ways to advance the study of knowledge leakage by focusing on the interrelationships between key drivers of knowledge leakage in collaborative agreements. First, a comprehensive overview and description of drivers that have been reported in the literature are provided. Furthermore, this study incorporates the employees’—from the case firm—inputs to build an integrated model using the ISM technique and MICMAC analysis, a first in knowledge leakage studies. Finally, this work supports practitioners in developing a better understanding of the complex nature of knowledge leakage in collaborative settings.
The remainder of this paper is structured as follows: Section 2 presents a literature review. Section 3 provides an overview of the research methodology. The Section 4 presents the model development and validation while Section 5 discusses the final model and its implications. Finally, Section 6 concludes with some limitations and suggested future research directions.

2. Literature Review

2.1. Knowledge Leakage in Collaborative Agreements

According to several studies (e.g., Durst and Ferenhof 2014; Guo et al. 2021; Zhao and Liang 2011), collaborative agreements can expose organisations to the danger of knowledge leakage. In collaborative agreements that are based on co-opetition, where collaboration and competition are intertwined (Hoffmann et al. 2018), the likelihood of knowledge leakage becomes even more evident. Theoretically, collaborative agreements are designed to bring organisations together to accomplish a shared objective by learning from one another and more efficient use of resources (Bakker et al. 2008), however, this may not necessarily be the case in practice, since partners may have incongruent private interests, resulting in opportunistic behaviour such as misappropriation of knowledge (Jiang et al. 2013). Although the exchange of knowledge between firms is necessary, the more core knowledge is shared, the greater the likelihood of losing the firm’s competitive advantage (Frishammar et al. 2015; Galati et al. 2019). In this regard, it is necessary to find and maintain a balance.
Kaiser et al. (2021) expressed a similar viewpoint regarding the optimal level of knowledge sharing and knowledge protection practices as a means of minimising knowledge leakage. Using a semiconductor industry context, they designed a grey-box model to protect knowledge from leakage in data-centric collaborations. Kunttu and Neuvo (2019) found that mutual trust building, based on a personal level relationship, is one of the key processes that enable partners to balance learning and protection while simultaneously lowering informational barriers in collaborations. In an R&D collaborative project, Hurmelinna-Laukkanen (2011) examined 242 Finnish companies in order to better understand the issue of maintaining an optimal balance between knowledge sharing and knowledge protection primarily to curb knowledge leakage. Their results revealed that the efficient application of knowledge protection while engaging in knowledge sharing practices among varying partners facilitates innovation performance. This confirms the existing notion of an appropriate balance between knowledge sharing and knowledge protection.
To illuminate the dilemma of knowledge protection and knowledge sharing in collaborative business partnerships, Wei et al. (2018) drew upon transaction cost and psychological contract theories. The authors were primarily interested in determining how knowledge protection affects partnership quality and project outcomes. Results showed that knowledge protection adversely impacted partnership quality and project performance. Likewise, this demonstrates the importance of having a balanced approach to knowledge sharing to maximise project performance and knowledge protection to minimise knowledge leakage. The determination of the right equilibrium justifies the complexity associated with knowledge leakage in collaborative arrangements.

2.2. Key Drivers of Knowledge Leakage in Collaborative Agreements

Having reviewed the literature, we identified several drivers of knowledge leakage in collaborative agreements. Opportunistic behaviour has been identified as one driver that may trigger knowledge leakage in collaborations among firms (Estrada et al. 2016; Fawad Sharif et al. 2020b). As early as 1975, Williamson (1975) defined opportunistic behaviour as “self-interest seeking with guile” (p. 9). In collaborative agreements, opportunistic behaviour is accompanied by a breach of trust as a partner attempts to misappropriate proprietary knowledge (Estrada et al. 2016; Jiang et al. 2013).
Distrust is regarded as one of the most critical drivers of knowledge leakage in collaborative agreements (Raza-Ullah 2021); which is defined as the expectation that a partner will act detrimentally to the focal firm (Govier 1994). According to Fawad Sharif et al. (2022), the lack of trust is responsible for knowledge leakage since the presence of distrust leads partner firms to focus on personal goals instead of the project’s overall objectives. This, in turn, can result in them developing opportunistic intentions and misappropriating valuable knowledge from the focal firm. One way to restrain opportunistic actions is through the implementation of a formal contract between collaborating firms which is in line with the transaction cost theory. In contrast, “without formal contracts, partner firms have stronger incentives to acquire each other’s knowledge beyond the scope of the cooperative agreement” (Jiang et al. 2013, p. 985). Thus, the lack of formal contracts may allow opportunistic behaviour to spread between partner firms, resulting in knowledge leakage.
An era in which inter-firm collaborations are increasingly driven by digital transformation (Appio et al. 2021), inadequate technological competence of employees (Altukruni et al. 2021), weak Bring-Your-Own-Device (BYOD) policies (Serna et al. 2017), and substandard security measures (Altukruni et al. 2021; Durst and Zieba 2019) pose a risk of sensitive knowledge being exposed or compromised. This exposed knowledge may even end up with external parties who are not part of the collaborative agreement and eventually result in reputational damage (Ahmad et al. 2014) and loss of competitiveness for the affected firm (Durst et al. 2015; Ritala et al. 2015).
Moreover, research (e.g., Nishat Faisal et al. 2007; Norman 2002; Oxley and Wada 2009) has strongly linked knowledge leakage to subcontracting activities such as outsourcing, which are typically referred to as vertical relationships (Tidd and Izumimoto 2002). According to some scholars (e.g., Belderbos et al. 2004; Huo et al. 2022), vertical relationships orchestrate knowledge leakage less since they are mostly non-competitive. However, this may not always be the case since downstream partners may wish to take advantage of the upstream firm’s dependence (Fang et al. 2016).
Individual incentives may also trigger knowledge leakage in collaborative agreements, but research on this aspect has been scarce (Tan et al. 2016). In this case, an employee is incentivised to provide confidential information about his/her firm to outsiders through fraudulent means, resulting in inappropriate knowledge disclosure. In this regard, dissatisfied or disloyal employees—viewed as a concrete form of knowledge leakage (Durst and Ferenhof 2014)—may be a target for engaging in such activities. In addition, collaboration between competing firms may lead to knowledge leakage (Lee 2002; Zhao et al. 2002). It is the tension between value creation and value appropriation that often causes partners to act opportunistically, which increases the likelihood of knowledge leakage (Raza-Ullah and Eriksson 2017). The situation is even more precarious in that competing firms often possess specialised knowledge that gives them an edge over their competitors, so when knowledge leaks occur, there can be significant adverse effects on the firm in question.
Below (Table 1) is a summary of the identified drivers of knowledge leakage in collaborative agreements pending opinions from employees of the case firm for validation.

3. Research Methodology

The research methodology, which integrated the ISM technique and MICMAC to analyse key drivers of knowledge leakage in collaborative agreements, used for this study is illustrated in Figure 1. In this integrated model, the ISM technique is used to establish a contextual relationship among the drivers and leads to the development of a structural model of the drivers, while the MICMAC analysis is used to categorise the drivers into clusters based on their influencing power.
Several multi-criteria decision-making (MCDM) techniques are available in the literature, which are considered effective at addressing complex issues, such as DEMATEL, Graph theory, AHP, and ANP (dos Santos Gonçalves and Campos 2022). In DEMATEL, for example, cause-effect relationships between variables are revealed. Graph theory can be used to establish interactions among variables; however, the graph edges pose a reliability concern (Wagner and Neshat 2010). In terms of drawing a hierarchy of variables, AHP is an effective tool (Jakhar and Barua 2014). The ANP can also provide dependencies between variables, but it is considered complicated and not widely accepted (Zhao et al. 2021). None of the MCDM techniques is effective in establishing contextual relationships between variables by assessing their influencing power, as ISM-MICMAC does (Bux et al. 2020).
Researchers have utilised the ISM-MICMAC integrated approach in a wide variety of areas, such as promoting sustainability through corporate social responsibility (Bux et al. 2020), managing risks in the agri-food supply chain (Ramos et al. 2021), addressing barriers to Industry 4.0 (Goel et al. 2022) and reducing supply chain risks in wind power projects (Troche-Escobar et al. 2018).
As a starting point, the key drivers of knowledge leakage in collaborative agreements identified through the literature review were listed in an Excel spreadsheet along with brief descriptions, which were then sent via email in advance to the case firm. Having access to this firm was made possible through an employee of the firm who participated in a summer school in connection with a research project. This employee mainly serves as the firm’s communication officer with additional responsibilities such as risk management and ESG strategy implementation and is the direct point of contact with the firm’s collaborators, i.e., suppliers, partners, and B-to-B customers; whose role is suitable for the present study.
In the validation process, two discussion sessions were conducted following Haleem et al.’s (2016) work. During the first discussion session, the communication officer, the CEO, and two members of the operations team participated. This discussion aimed to validate the identified drivers derived from the literature, which is the immediate step prior to the modelling phase. Additionally, this met the minimum eligibility criteria for the use of this technique (see Haleem et al. 2016; Mathiyazhagan et al. 2013; Ravi and Shankar 2005). While in the second session, discussions were held in order to reach a consensus concerning the contextual relationships among the validated drivers; a phase technically included in the modelling process.
The next sections discuss the modelling phase of the validated drivers.

3.1. Interpretive Structural Modelling (ISM) Technique

Managing knowledge leakage in collaborative arrangements is a demanding task, particularly since it involves drivers that are complex in nature. Due to this reason, a powerful tool is necessary to assist in understanding and managing this complexity. ISM meets this requirement. Warfield (1973) developed the ISM to examine complex issues by analysing unorganised factors and converting them into a well-structured model. The interpretive nature of this technique derives from its ability to utilise experts in its application. By applying this technique, it is possible to establish interrelationships among the identified drivers of knowledge leakage in collaborative agreements and construct a structured model based on the knowledge and experience of the case firm’s employees.
Following the first step which identified and validated the key drivers, the ISM technique was applied as follows:
  • Contextual relationship between the identified key drivers is developed to determine which pairs of drivers should be checked;
  • Structural self-interaction matrix (SSIM) is developed for the drivers that show pairwise relationships among them;
  • Reachability matrix (RM) is derived from the SSIM by replacing each cell entry with 1 and 0, as well as checking the matrix for transitivity. Assuming transitivity of contextual relations is a fundamental tenet of ISM. The rule states that if variable A is related to variable B and variable B is related to variable C, then variable A is necessarily related to variable C. This leads to the development of a final RM;
  • Final RM is partitioned into several levels;
  • ISM model is developed based on the contextual relationships given above and then transitive links are removed;
  • Developed ISM model is reviewed to ensure that any conceptual inconsistencies and necessary modifications are considered.

3.2. Cross-Impact Matrix Multiplication Applied to Classification (MICMAC) Analysis

Duperrin and Godet (1973) proposed MICMAC analysis for assessing indirect relationships among system elements. Among managers, it is also considered useful for in-depth analysis of a system (Elmsalmi and Hachicha 2013). In this study, we used the MICMAC analysis to classify the identified key drivers of knowledge leakage in collaborative agreements according to their driving power (DrP) and dependence power (DeP). According to Figure 1, the MICMAC graph is derived from the final RM, by summing across the rows and columns of the final RM to determine each driver’s driving power and dependence power. The drivers were then classified into four clusters (Wu et al. 2022):
Autonomous drivers (Cluster I) possess weak driving and dependence powers. These drivers are often referred to as excluded drivers due to their limited influence.
Dependent drivers (Cluster II) possess weak driving power but strong dependence power. For decision makers, these drivers represent an unfavourable outcome.
Linkage drivers (Cluster III) possess strong driving and dependence powers. Typically, these drivers are unstable.
Independent drivers (Cluster IV) possess strong driving power but weak dependence power. They are generally considered to be the most important drivers and are accorded the highest priority.

4. Model Development and Validation

Based on the research methodology presented earlier, we developed an integrated ISM-MICMAC model, which was validated through a case firm. To maintain the firm’s anonymity, we used Alpha as a pseudonym. Alpha is a leader in the magnet technology market based in Germany. It provides sophisticated and customised magnetic products to its clients, making it a firm with a high level of expertise. As Alpha’s production of magnetic products is dependent upon raw materials imported from outside Europe, it belongs to a global supply chain network. For this reason, Alpha engages in a wide variety of collaborative agreements. As a result, there is a high risk of knowledge leakage, especially when dealing with their partners and business-to-business clients. As mentioned previously, due to Alpha’s knowledge-intensive nature and external collaborations, it was viewed as an appropriate case firm to validate a model regarding knowledge leakage.

4.1. Application of Integrated ISM-MICMAC Model

4.1.1. Structural Self-Interaction Matrix (SSIM)

Following the identification of the nine drivers that influence knowledge leakage in collaborative agreements through the literature review and their validation based upon opinions obtained from employees of the case firm, in the next step contextual relationships were determined. The contextual relationship is one of the steps in the ISM modelling that heavily relies on the inputs from the involved participants (Foli 2022; Ramos et al. 2021). Through multiple discussions and reflections, the employees were able to establish relationships among the nine drivers identified. As a guideline, we adopted the following four conventional symbols as widely used in the literature (e.g., Sushil 2012) to assign relationships among the drivers:
  • V for a forward relation of driver i to j (driver i will influence driver j/ij);
  • A for backward relation of driver i to j (driver j will influence driver i/ji);
  • X for a bidirectional relation of drivers i and j (drivers i and j will influence each other /i ←→ i); and
  • O for no relation exists between drivers i and j (drivers i and j have no influence on each other).
Based on contextual relationships, the SSIM is derived by using the symbols as cell entries as shown in Table 2.

4.1.2. Reachability Matrix (RM)

As a next step, the SSIM derived in the previous section was transformed into an initial reachability matrix. To do this, we converted each cell entry in the SSIM into binary, i.e., 0’s and 1’s, where zero represents no interrelationship between the drivers, whereas one indicates there is an interrelationship between them. Since these cell entries are symbols, we transformed them according to the following rules (Bux et al. 2020; Foli 2022):
  • For SSIM cell entries (i, j) denoted by V, the initial reachability matrix cell entries (i, j) become 1 and (j, i) become 0;
  • For SSIM cell entries (i, j) denoted by A, the initial reachability matrix cell entries (i, j) become 0 and (j, i) become 1;
  • For SSIM cell entries (i, j) denoted by X, the initial reachability matrix cell entries (i, j) and (j, i) become 1; and
  • For SSIM cell entries (i, j) denoted by O, the initial reachability matrix cell entries (i, j) and (j, i) become 0.
Upon application of the rules, the initial reachability matrix was determined as shown in Table 3. The initial reachability matrix is then used to determine the final reachability matrix. The final reachability matrix (see Table 4) is constructed based on the transitivity rule, which states that if driver i influences driver j and driver j influences driver k, then driver i has an influence on driver k.

4.1.3. Level Partitions

In this step, the final reachability matrix was systematically partitioned into different levels, using the sets of reachability, antecedents, and intersections from the final reachability matrix. A reachability set (Rsi) was obtained for each driver across the final reachability matrix in the horizontal direction with cell entries “1”. The antecedent set (Asi) was similarly derived for each driver across the final reachability matrix in the vertical direction with cell entries “1”. As for the intersection set, it was derived through an iterative partitioning process. For example, as shown in Table 5, drivers D01, D03, D04, D05, D06, D07, and D08 are assigned to Level 1 since their Rsi intersected with their Asi exhaustively, while the rest did not. This process was repeated until all the drivers had been partitioned.

4.1.4. Formation of ISM Model

The ISM model of the drivers was derived from the final reachability matrix. It is important to note that the final reachability matrix includes transitivity relationships; these transitivity relationships were removed in order to maintain only direct interrelationships. As demonstrated in Figure 2, the interrelationships between drivers are indicated by arrows. In the case of D08 and D01, for example, there are two arrows at the end, which indicates that D01 exerts a direct influence on D08 and vice versa.
Moreover, the ISM provides a detailed representation of the drivers based on their level partitions. In the model, D01, D03, D04, D05, D06, D07, and D08 were structurally placed at the top, followed by D02 and D09.

4.1.5. MICMAC Analysis

Finally, we used the MICMAC analysis to classify the drivers into clusters. The result of the analysis generated two clusters—the Independent cluster and the Linkage cluster (Figure 3). No driver was placed under the Autonomous or the Dependent cluster.
Considering that D02 and D09 have a high driving power, but a low dependent power, they were assigned to the Independent cluster. Whereas D01, D03, D04, D05, D06, D07, and D08 were classified under the Linkage cluster since they possess a high degree of driving and dependence.

5. Discussion

Our research revealed nine key drivers of knowledge leakage in collaborative agreements. Besides the relevance of the identified drivers in the literature, employees including the CEO of the case firm confirmed their practicality at the collaborative level. Consequently, our findings regarding the drivers of knowledge leakage in collaborative agreements are in line with those found in the literature. As an example, distrust as a driver of knowledge leakage is consistent with studies from Fawad Sharif et al. (2020b, 2022) which found that distrust significantly influenced knowledge leakage in collaborative projects. Our findings also support previous studies (e.g., Jiang et al. 2013) that found incomplete contracts to be associated with knowledge leakage in similar collaborative settings. The validation of substandard security measures, weak BYOD policies, insufficient technological competence, perceived opportunism, expected incentives, the existence of horizontal competition, and sub-contracting activities as contributing factors to knowledge leakage is consistent with various findings in the literature (e.g., Serna et al. 2017; Zeiringer and Thalmann 2022).
The results of the ISM model indicate that there are three partitions among the nine identified drivers, which are hierarchical in nature and have several interdependencies. It is clear from this that knowledge leakage is a complex issue (Kaiser et al. 2021) and therefore requires a more holistic approach (Durst and Zieba 2019). Further, we observe that an incomplete contract in collaborative agreements contributes significantly to knowledge leakage, as it forms the foundation of the ISM hierarchy. Considering the fact that most previous studies (e.g., Jiang et al. 2013; Fawad Sharif et al. 2020b) have reached similar conclusions, this is not surprising. Additionally, the ISM model indicates that incomplete contracts are associated with perceived opportunism. The reason for this can be explained in the context of a given collaborative project in which the contractual binding involving firms is not comprehensive. This paves the way for opportunistic behaviour to prevail and thrive, resulting in knowledge leakage. It is also found that an incomplete contract is directly linked to distrust. In a similar vein, when partners demonstrate a lack of commitment in a collaborative agreement, it is likely to result in distrust among them. Likewise, Fawad Sharif et al. (2020b) conclude that the existence of more complete contract can lead to higher levels of trust. It is clear from the above that contract design has an important role to play in minimising knowledge leakage (knowledge protection), confirming previous research. It also underlines the need for understanding the link between trust and formal contracts with regard to knowledge leakage (Jiang et al. 2013).
Despite the benefits of subcontracting, such as reduced costs, improved service quality, and more time to focus on the core business, it is also considered to be a significant driver of knowledge leakage in collaborative agreements. As shown in the ISM model, subcontracting activities have a direct correlation with perceived opportunism, insufficient technological competence, and expected incentives. As tasks are outsourced outside of a project, external collaboration is necessary, either in the form of sharing insight and knowledge about the project with subcontractors or third parties. In turn, such external collaboration can result in vertical relationships (Nishat Faisal et al. 2007) that breed opportunistic behaviour among partners. In relation to the correlation between subcontracting activities and insufficient technological competence, Durst and Zieba (2019) argue that the more firms outsource, the more they tend to rely on their contractors, consequently losing the necessary skills and capacities to operate the business. These skills could be technical capabilities to protect key organisational assets such as knowledge.
The upper hierarchy of the ISM model consists of the existence of horizontal competition, distrust, perceived opportunism, weak BYOD policies, insufficient technological competence, expected incentives, and substandard security measures. Among the drivers, substandard security measure is the most interconnected. It is directly associated with horizontal competition, perceived opportunism, weak BYOD policies, insufficient technological competence, and expected incentives. Thus, it implies that, without measures like security, many drivers may emerge and contribute to knowledge leakage (Altukruni et al. 2021). As well, it is important to note that even though substandard security measure has numerous connections, it is less influential due to their lower driving power when compared to subcontracting activities and incomplete contracts.
Finally, the MICMAC findings indicate that the nine key drivers of knowledge leakage in collaborative agreements can be classified into two main clusters. Based on the results, incomplete contracts and sub-contracting activities are placed under the Independent cluster. This indicates that incomplete contracts and subcontracting activities have a strong driving force, but a weak dependence power. This confirms their position at the bottom of the ISM hierarchy. A well-written contract, according to Qiu and Haugland (2019), specifies each company’s rights and responsibilities, along with the primary motive of the collaboration. In this regard, if a contract such as this is not available, it may lead to undesirable behaviours and traits, such as opportunism (Fawad Sharif et al. 2020a) and distrust (Fawad Sharif et al. 2022; Yang et al. 2019). It is therefore understandable why incomplete contracts attained the highest driving power as far as knowledge leakage in collaborative agreements is concerned. The remaining drivers, which include the existence of horizontal competition, distrust, perceived opportunism, insufficient technological expertise, expected incentives, and substandard security measures, are included in the Linkage cluster, which implies that they possess strong driving and dependence powers. Based on our findings, it appears that the drivers in the Linkage cluster have a relatively lower driving power than those in the Independent cluster, as this explains why the seven drivers in the Linkage cluster are placed at the top of the ISM hierarchy.

Implications

This study specifically contributes to the knowledge leakage research field by establishing interrelationships among drivers of knowledge leakage in collaborative agreements, in contrast to previous studies that have primarily focused on mediation-moderation relationships. This was achieved by first proposing an integrated ISM-MICMAC model and then by validating the model using a single case. Therefore, it can be argued that this study is one of those first attempts to integrate the ISM technique and MICMAC analysis to analyse knowledge leakage drivers. Further, the authors have attempted to answer calls for robust approaches in understanding the phenomenon of knowledge leakage by using a modelling research design approach (e.g., Li and Li 2021; Wu et al. 2021).
For practitioners, the study offers decision makers such as CEOs, managers, and directors a better understanding of the complexity of knowledge leakage when engaging in collaborative projects. Additionally, the findings provide risk managers in smaller businesses in particular with a list of key drivers of knowledge leakage that have been validated based upon opinions obtained from employees of the case firm in likely similar industries. It is also possible that these findings may be useful and relevant to risk managers working in other contexts. Moreover, it seems beneficial for project managers involved in collaborative projects to develop strategies for successfully implementing projects in response to the identified driver to minimise knowledge leakage concerns. In addition, the proposed integrated ISM-MICMAC model would also serve as a useful tool for managers to support their existing risk management frameworks.

6. Conclusions

In this study, drivers of knowledge leakage in collaborative agreements were analysed using an integrated ISM-MICMAC model validated by employees including the CEO of a magnetic processing firm located in Germany. Based on a literature review and supported by inputs obtained from employees of the case firm, nine key drivers were identified and validated. Through the application of the ISM-MICMAC model, hierarchical interrelationships and classification of the drivers were achieved. While the ISM technique was helpful in establishing interrelationships, the MICMAC analysis assisted in classifying them according to their driving and dependence powers.
Hence, the major contribution of this study to theory is the development of the integrated ISM-MICMAC model, by fulfilling the proposed objectives. As a result, the study has attempted to answer the “what”, “how”, and “why” questions, which are fundamental to theory building (Whetten 1989). The “what” question has been answered by identifying drivers of knowledge leakage from the literature and validated based upon opinions obtained from employees of the case firm. By demonstrating the strength and power of these drivers through interpretive analysis, the “how” and “why” questions have also been addressed.

Limitation and Future Research Directions

Since the ISM-MICMAC model is based on a single firm (i.e., the small magnetic processing firm), it may be biased and limited in its application to one industry. It is therefore recommended that future research consider different contexts, including various types of industries and SMEs, in order to strengthen the generalisability of the findings. As nine drivers were identified for the development and validation of the model, future work may consider exploring additional drivers. From our findings, we discovered a few relationships among the drivers that we could not compare and contrast with literature since there were no studies regarding their nature; therefore, we may use system dynamics modelling (SDM) or statistical methods such as structural equation modelling (SEM) to verify these relationships in future studies. Finally, it may be worthwhile to employ longitudinal studies in the future to investigate the phenomenon of knowledge leakage over time, given its complexity.

Author Contributions

Conceptualisation, S.F.; methodology, S.F.; validation, S.F.; formal analysis, S.F.; investigation, S.F.; writing—original draft preparation, S.F.; writing—review and editing, S.F. and S.D.; supervision, S.D.; project administration, S.D.; funding acquisition, S.D. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Institutional Review Board Statement

Ethical review and approval were waived for this study because it was not required. The data are not considered to be sensitive or confidential in nature. Vulnerable or dependent groups were not included. The subject matter was limited to topics that are strictly within the professional competence of the participants.

Informed Consent Statement

Informed consent was obtained from all subjects involved in the study.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Ahlfänger, Marcel, Hans Georg Gemünden, and Jens Leker. 2022. Balancing knowledge sharing with protecting: The efficacy of formal control in open innovation projects. International Journal of Project Management 40: 105–19. [Google Scholar] [CrossRef]
  2. Ahmad, Atif, Rachelle Bosua, and Rens Scheepers. 2014. Protecting organizational competitive advantage: A knowledge leakage perspective. Computers & Security 42: 27–39. [Google Scholar] [CrossRef]
  3. Ali, Sikandar, Samad Baseer, Irshad Ahmed Abbasi, Bader Alouffi, Wael Alosaimi, and Jiwei Huang. 2022. Analyzing the interactions among factors affecting cloud adoption for software testing: A two-stage ISM-ANN approach. Soft Computing 26: 8047–75. [Google Scholar] [CrossRef]
  4. Altukruni, Hibah, Sean B. Maynard, Moneer Alshaikh, and Atif Ahmad. 2021. Exploring Knowledge Leakage Risk in Knowledge-Intensive Organisations: Behavioural aspects and key controls. arXiv arXiv:2104.07140. [Google Scholar]
  5. Appio, Francesco Paolo, Federico Frattini, Antonio Messeni Petruzzelli, and Paolo Neirotti. 2021. Digital Transformation and Innovation Management: A Synthesis of Existing Research and an Agenda for Future Studies. Journal of Product Innovation Management 38: 4–20. [Google Scholar] [CrossRef]
  6. Bakker, Elmer, Helen Walker, Fredo Schotanus, and Christine Harland. 2008. Choosing an organisational form: The case of collaborative procurement initiatives. International Journal of Procurement Management 1: 297–317. [Google Scholar]
  7. Belderbos, René, Martin Carree, Bert Diederen, Boris Lokshin, and Reinhilde Veugelers. 2004. Heterogeneity in R&D cooperation strategies. International Journal of Industrial Organization 22: 1237–63. [Google Scholar] [CrossRef]
  8. Belderbos, René, Martin Carree, Boris Lokshin, and Juan Fernández Sastre. 2015. Inter-temporal patterns of R&D collaboration and innovative performance. The Journal of Technology Transfer 40: 123–37. [Google Scholar] [CrossRef]
  9. Bond-Barnard, Taryn Jane, Lizelle Fletcher, and Herman Steyn. 2018. Linking trust and collaboration in project teams to project management success. International Journal of Managing Projects in Business 11: 432–57. [Google Scholar] [CrossRef]
  10. Bux, Hussain, Zhe Zhang, and Naveed Ahmad. 2020. Promoting sustainability through corporate social responsibility implementation in the manufacturing industry: An empirical analysis of barriers using the ISM-MICMAC approach. Corporate Social Responsibility and Environmental Management 27: 1729–48. [Google Scholar] [CrossRef]
  11. Christina, Sarigianni, Thalmann Stefan, and Manhart Markus. 2016. Protecting Knowledge in the Financial Sector: An Analysis of Knowledge Risks Arising from Social Media. Paper presented at the 2016 49th Hawaii International Conference on System Sciences (HICSS), Koloa, HI, USA, January 5–8. [Google Scholar]
  12. Deniaud, Ioana Filipas, François Marmier, Didier Gourc, and Sophie Bougaret. 2016. A Risk Management Approach for Collaborative NPD Project. Paper presented at the 2016 International Conference on Industrial Engineering, Management Science and Application (ICIMSA), Jeju, Korea, May 23–26. [Google Scholar]
  13. dos Santos Gonçalves, Paulo Vitor, and Lucila M. S. Campos. 2022. A systemic review for measuring circular economy with multi-criteria methods. Environmental Science and Pollution Research 29: 31597–611. [Google Scholar] [CrossRef] [PubMed]
  14. Duperrin, Jean-Claude, and Michel Godet. 1973. Hierarchization Method for the Elements of a System. An Attempt to Forecast a Nuclear Energy System in Its Societal Context (CEA-R-4541), France. Available online: https://inis.iaea.org/search/search.aspx?orig_q=RN:05115595 (accessed on 31 August 2022).
  15. Durst, Susanne. 2020. Knowledge Risk Management in Organizations: Findings from Latin America. Multidisciplinary Business Review 15: 11–19. [Google Scholar] [CrossRef]
  16. Durst, Susanne, and Helio Aisenberg Ferenhof. 2014. Knowledge Leakages and Ways to Reduce Them in Small and Medium-Sized Enterprises (SMEs). Information 5: 440–50. [Google Scholar] [CrossRef]
  17. Durst, Susanne, and Malgorzata Zieba. 2019. Mapping knowledge risks: Towards a better understanding of knowledge management. Knowledge Management Research & Practice 17: 1–13. [Google Scholar] [CrossRef]
  18. Durst, Susanne, Lena Aggestam, and Helio Aisenberg Ferenhof. 2015. Understanding knowledge leakage: A review of previous studies. VINE 45: 568–86. [Google Scholar] [CrossRef]
  19. Dye, Ronald A., and Sri S. Sridhar. 2003. Investment Implications of Information Acquisition and Leakage. Management Science 49: 767–83. [Google Scholar] [CrossRef]
  20. Elmsalmi, Manel, and Wafik Hachicha. 2013. Risks prioritization in global supply networks using MICMAC method: A real case study. Paper presented at the 2013 International Conference on Advanced Logistics and Transport, Sousse, Tunisia, May 29–31. [Google Scholar]
  21. Estrada, Isabel, Dries Faems, and Pedro de Faria. 2016. Coopetition and product innovation performance: The role of internal knowledge sharing mechanisms and formal knowledge protection mechanisms. Industrial Marketing Management 53: 56–65. [Google Scholar] [CrossRef]
  22. Fang, Eric, Jongkuk Lee, Robert Palmatier, and Zhaoyang Guo. 2016. Understanding the Effects of Plural Marketing Structures on Alliance Performance. Journal of Marketing Research 53: 628–45. [Google Scholar] [CrossRef]
  23. Fawad Sharif, Sayed Muhammad, Yang Naiding, Atiq Ur Rehman, Umar Farooq Sahibzada, and Fouzia Kanwal. 2020a. From partners’ learning intent to knowledge leakage: The role of contract and trust. Knowledge Management Research & Practice, 1–12. [Google Scholar] [CrossRef]
  24. Fawad Sharif, Sayed Muhammad, Yang Naiding, Yan Xu, and Atiq ur Rehman. 2020b. The effect of contract completeness on knowledge leakages in collaborative construction projects: A moderated mediation study. Journal of Knowledge Management 24: 2057–78. [Google Scholar] [CrossRef]
  25. Fawad Sharif, Sayed Muhammad, Yang Naiding, and Sayed Kifayat Shah. 2022. Restraining knowledge leakage in collaborative projects through HRM. Vine Journal of Information and Knowledge Management Systems, ahead-of-print. [Google Scholar] [CrossRef]
  26. Foli, Samuel. 2022. Total interpretive structural modelling (TISM) and MICMAC approach in analysing knowledge risks in ICT-supported collaborative project. Vine Journal of Information and Knowledge Management Systems 52: 394–410. [Google Scholar] [CrossRef]
  27. Frishammar, Johan, Kristian Ericsson, and Pankaj C. Patel. 2015. The dark side of knowledge transfer: Exploring knowledge leakage in joint R&D projects. Technovation 41–42: 75–88. [Google Scholar] [CrossRef]
  28. Galati, Francesco, Barbara Bigliardi, Alberto Petroni, Giorgio Petroni, and Giovanna Ferraro. 2019. A framework for avoiding knowledge leakage: Evidence from engineering to order firms. Knowledge Management Research & Practice 17: 340–52. [Google Scholar] [CrossRef]
  29. Garousi Mokhtarzadeh, Nima, Hannan Amoozad Mahdiraji, Ismail Jafarpanah, Vahid Jafari-Sadeghi, and Stefano Bresciani. 2021. Classification of inter-organizational knowledge mechanisms and their effects on networking capability: A multi-layer decision making approach. Journal of Knowledge Management 25: 1665–88. [Google Scholar] [CrossRef]
  30. Goel, Pankaj, Raman Kumar, Harish Kumar Banga, Swapandeep Kaur, Rajesh Kumar, Danil Yurievich Pimenov, and Khaled Giasin. 2022. Deployment of Interpretive Structural Modeling in Barriers to Industry 4.0: A Case of Small and Medium Enterprises. Journal of Risk and Financial Management 15: 171. [Google Scholar] [CrossRef]
  31. Goi, Hoe Chin, Muhammad Mohsin Hakeem, and Frendy. 2022. Bridging Academics’ Roles in Knowledge Diffusion in Sustainability-Driven Public-Private Partnerships: A Case Study of the SDGs Workshop in Central Japan. Sustainability 14: 2378. [Google Scholar] [CrossRef]
  32. Govier, Trudy. 1994. Is It a Jungle Out There? Trust, Distrust and the Construction of Social Reality. Dialogue 33: 237–52. [Google Scholar] [CrossRef]
  33. Guo, Min, Naiding Yang, and Yanlu Zhang. 2021. Focal enterprises’ control and knowledge transfer risks in R&D networks. European Journal of Innovation Management 24: 870–92. [Google Scholar] [CrossRef]
  34. Guo, Wenyu, Jianjun Yang, Dan Li, and Chongchong Lyu. 2020. Knowledge sharing and knowledge protection in strategic alliances: The effects of trust and formal contracts. Technology Analysis & Strategic Management 32: 1366–78. [Google Scholar] [CrossRef]
  35. Haleem, Abid, Sunil Luthra, Bisma Mannan, Sonal Khurana, Sanjay Kumar, and Sirajuddin Ahmad. 2016. Critical factors for the successful usage of fly ash in roads & bridges and embankments: Analyzing indian perspective. Resources Policy 49: 334–48. [Google Scholar] [CrossRef]
  36. Hislop, Donald, Rachelle Bosua, and Remko Helms. 2018. Knowledge Management in Organizations: A Critical Introduction. Oxford: Oxford University Press. [Google Scholar]
  37. Ho, Hillbun, and Shankar Ganesan. 2013. Does Knowledge Base Compatibility Help or Hurt Knowledge Sharing between Suppliers in Coopetition? the Role of Customer Participation. Journal of Marketing 77: 91–107. [Google Scholar] [CrossRef] [Green Version]
  38. Hoffmann, Werner, Dovev Lavie, Jeffrey J. Reuer, and Andrew Shipilov. 2018. The interplay of competition and cooperation. Strategic Management Journal 39: 3033–52. [Google Scholar] [CrossRef]
  39. Huo, Lisha, Yunfei Shao, Yi Jin, and Weijia Kong. 2022. Alliance coopetition and breakthrough innovation: The contributory roles of resources integration and knowledge ambiguity. Technology Analysis & Strategic Management, 1–15. [Google Scholar] [CrossRef]
  40. Hurmelinna-Laukkanen, Pia. 2011. Enabling collaborative innovation—Knowledge protection for knowledge sharing. European Journal of Innovation Management 14: 303–21. [Google Scholar] [CrossRef]
  41. Jakhar, Suresh Kumar, and Mukesh Kumar Barua. 2014. An integrated model of supply chain performance evaluation and decision-making using structural equation modelling and fuzzy AHP. Production Planning & Control 25: 938–57. [Google Scholar] [CrossRef]
  42. Jiang, Xu, Mei Li, Shanxing Gao, Yongchuan Bao, and Feifei Jiang. 2013. Managing knowledge leakage in strategic alliances: The effects of trust and formal contracts. Industrial Marketing Management 42: 983–91. [Google Scholar] [CrossRef]
  43. Jiang, Xu, Yongchuan Bao, Yan Xie, and Shanxing Gao. 2016. Partner trustworthiness, knowledge flow in strategic alliances, and firm competitiveness: A contingency perspective. Journal of Business Research 69: 804–14. [Google Scholar] [CrossRef]
  44. Jung, Seoyoung, Seulki Lee, and Jungho Yu. 2021. Identification and Prioritization of Critical Success Factors for Off-Site Construction Using ISM and MICMAC Analysis. Sustainability 13: 8911. [Google Scholar] [CrossRef]
  45. Kaiser, Rene, Stefan Thalmann, and Viktoria Pammer-Schindler. 2021. An investigation of knowledge protection practices in inter-organisational collaboration: Protecting specialised engineering knowledge with a practice based on grey-box modelling. Vine Journal of Information and Knowledge Management Systems 51: 713–31. [Google Scholar] [CrossRef]
  46. Kleber, Matheus, Néstor Fabián Ayala, Marie-Anne Le Dain, Érico Marcon, and Alejandro Germán Frank. 2019. Knowledge sharing in collaborative new product development: A study of grey box supplier involvement configuration. Production 29: e20180071. [Google Scholar] [CrossRef]
  47. Kunttu, Leena, and Yrjö Neuvo. 2019. Balancing learning and knowledge protection in university-industry collaborations. The Learning Organization 26: 190–204. [Google Scholar] [CrossRef]
  48. Lee, Hau L. 2002. Aligning Supply Chain Strategies with Product Uncertainties. California Management Review 44: 105–19. [Google Scholar] [CrossRef]
  49. Li, Qian, and Yuanfei Kang. 2019. Knowledge Sharing Willingness and Leakage Risk: An Evolutional Game Model. Sustainability 11: 596. [Google Scholar] [CrossRef]
  50. Li, Xingong, and Xiaokai Li. 2021. The impact of different internet application contexts on knowledge transfer between enterprises. Systems 9: 87. [Google Scholar] [CrossRef]
  51. Mathiyazhagan, Kaliyan, Kannan Govindan, A.Noorul Haq, and Yong Geng. 2013. An ISM approach for the barrier analysis in implementing green supply chain management. Journal of Cleaner Production 47: 283–97. [Google Scholar] [CrossRef]
  52. Nishat Faisal, Mohd, Devinder Kumar Banwet, and Ravi Shankar. 2007. Information risks management in supply chains: An assessment and mitigation framework. Journal of Enterprise Information Management 20: 677–99. [Google Scholar] [CrossRef]
  53. Norman, Patricia M. 2002. Protecting knowledge in strategic alliances: Resource and relational characteristics. The Journal of High Technology Management Research 13: 177–202. [Google Scholar] [CrossRef]
  54. Oxley, Joanne E., and Rachelle C. Sampson. 2004. The Scope and Governance of International R&D Alliances. Strategic Management Journal 25: 723–49. [Google Scholar]
  55. Oxley, Joanne, and Tetsuo Wada. 2009. Alliance Structure and the Scope of Knowledge Transfer: Evidence from U.S.-Japan Agreements. Management Science 55: 635–49. [Google Scholar] [CrossRef]
  56. Papadas, Karolos-Konstantinos, George J. Avlonitis, Marylyn Carrigan, and Lamprini Piha. 2019. The interplay of strategic and internal green marketing orientation on competitive advantage. Journal of Business Research 104: 632–43. [Google Scholar] [CrossRef]
  57. Pateman, Hilary, Stephen Cahoon, and Shu-Ling Chen. 2016. The Role and Value of Collaboration in the Logistics Industry: An Empirical Study in Australia. The Asian Journal of Shipping and Logistics 32: 33–40. [Google Scholar] [CrossRef]
  58. Qiu, Xinlu, and Sven A. Haugland. 2019. The role of regulatory focus and trustworthiness in knowledge transfer and leakage in alliances. Industrial Marketing Management 83: 162–73. [Google Scholar] [CrossRef]
  59. Ramos, Edgar, Timothy J. Pettit, Mamun Habib, and Melissa Chavez. 2021. A model ISM-MICMAC for managing risk in agri-food supply chain: An investigation from the Andean region of Peru. International Journal of Value Chain Management 12: 62–85. [Google Scholar] [CrossRef]
  60. Ravi, V., and Ravi Shankar. 2005. Analysis of interactions among the barriers of reverse logistics. Technological Forecasting and Social Change 72: 1011–29. [Google Scholar] [CrossRef]
  61. Raza-Ullah, Tatbeeq. 2021. When does (not) a coopetitive relationship matter to performance? An empirical investigation of the role of multidimensional trust and distrust. Industrial Marketing Management 96: 86–99. [Google Scholar] [CrossRef]
  62. Raza-Ullah, Tatbeeq, and Jessica Eriksson. 2017. Knowledge Sharing and Knowledge Leakage in Dyadic Coopetitive Alliances Involving SMEs. In Global Opportunities for Entrepreneurial Growth: Coopetition and Knowledge Dynamics within and across Firms. Edited by Stavros Sindakis and Panagiotis Theodorou. Bradford: Emerald Publishing Limited, pp. 229–52. [Google Scholar]
  63. Ritala, Paavo, Heidi Olander, Snejina Michailova, and Kenneth Husted. 2015. Knowledge sharing, knowledge leaking and relative innovation performance: An empirical study. Technovation 35: 22–31. [Google Scholar] [CrossRef]
  64. Scaliza, Janaina Aparecida Alves, Daniel Jugend, Charbel Jose Chiappetta Jabbour, Hengky Latan, Fabiano Armellini, David Twigg, and Darly Fernando Andrade. 2022. Relationships among organizational culture, open innovation, innovative ecosystems, and performance of firms: Evidence from an emerging economy context. Journal of Business Research 140: 264–79. [Google Scholar] [CrossRef]
  65. Serna, Carlos Andrés González, Rachelle Bosua, Atif Ahmad, and Sean B. Maynard. 2017. Strategies to Mitigate Knowledge Leakage Risk caused by the use of mobile devices: A Preliminary Study. Paper presented at the 38th International Conference on Information Systems (ICIS 2017), Seoul, Korea, December 10–13; pp. 1–24. [Google Scholar]
  66. Shabtai, Asaf, Yuval Elovici, and Lior Rokach. 2012. A Survey of Data Leakage Detection and Prevention Solutions. New York: Springer Science & Business Media. [Google Scholar]
  67. Singh, Mahipal, Pankaj Kumar, and Rajeev Rathi. 2019. Modelling the barriers of Lean Six Sigma for Indian micro-small medium enterprises. The TQM Journal 31: 673–95. [Google Scholar] [CrossRef]
  68. Sushil, S. 2012. Interpreting the Interpretive Structural Model. Global Journal of Flexible Systems Management 13: 87–106. [Google Scholar] [CrossRef]
  69. Tan, Kim Hua, Wai Peng Wong, and Leanne Chung. 2016. Information and Knowledge Leakage in Supply Chain. Information Systems Frontiers 18: 621–38. [Google Scholar] [CrossRef]
  70. Taylor, Andrew. 2005. An operations perspective on strategic alliance success factors. International Journal of Operations & Production Management 25: 469–90. [Google Scholar] [CrossRef]
  71. Tidd, Joe, and Yasuhiko Izumimoto. 2002. Knowledge exchange and learning through international joint ventures: An Anglo-Japanese experience. Technovation 22: 137–45. [Google Scholar] [CrossRef]
  72. Troche-Escobar, Jorge Arnaldo, Herman Augusto Lepikson, and Francisco Gaudêncio Mendonça Freires. 2018. A Study of Supply Chain Risk in the Brazilian Wind Power Projects by Interpretive Structural Modeling and MICMAC Analysis. Sustainability 10: 3442. [Google Scholar] [CrossRef]
  73. Vafaei-Zadeh, Ali, Thurasamy Ramayah, Haniruzila Hanifah, Sherah Kurnia, and Imran Mahmud. 2020. Supply chain information integration and its impact on the operational performance of manufacturing firms in Malaysia. Information & Management 57: 103386. [Google Scholar] [CrossRef]
  74. Wagner, Stephan M., and Nikrouz Neshat. 2010. Assessing the vulnerability of supply chains using graph theory. International Journal of Production Economics 126: 121–29. [Google Scholar] [CrossRef]
  75. Wang, Lei, Jun Li, and Shengjun Wang. 2021. Rivalling firms’ absorptive capacity congruence in coopetition relationships: The reciprocal effects on firms’ innovation performance. Knowledge Management Research & Practice, 1–16. [Google Scholar] [CrossRef]
  76. Warfield, John N. 1973. On Arranging Elements of a Hierarchy in Graphic Form. IEEE Transactions on Systems, Man, and Cybernetics SMC-3: 121–32. [Google Scholar] [CrossRef]
  77. Wayne Gould, Robert. 2012. Open innovation and stakeholder engagement. Journal of Technology Management & Innovation 7: 1–11. [Google Scholar]
  78. Wei, Zelong, Zhanhe Du, and Yongchuan Bao. 2018. Outsourcer Knowledge Protection, Psychological Contract Schema, and Project Performance: A Vendor’s Perspective. IEEE Transactions on Engineering Management 65: 128–40. [Google Scholar] [CrossRef]
  79. Whetten, David A. 1989. What Constitutes a Theoretical Contribution? The Academy of Management Review 14: 490–95. [Google Scholar] [CrossRef]
  80. Williamson, Oliver E. 1975. Markets and hierarchies: Analysis and antitrust implications: A study in the economics of internal organization. In University of Illinois at Urbana-Champaign’s Academy for Entrepreneurial Leadership Historical Research Reference in Entrepreneurship. New York: Free Press. [Google Scholar]
  81. Wu, Haizhen, Zhao’an Han, and Yong Zhou. 2021. Optimal degree of openness in open innovation: A perspective from knowledge acquisition & knowledge leakage. Technology in Society 67: 101756. [Google Scholar] [CrossRef]
  82. Wu, Zezhou, Kaijie Yang, Hong Xue, Jian Zuo, and Shenghan Li. 2022. Major barriers to information sharing in reverse logistics of construction and demolition waste. Journal of Cleaner Production 350: 131331. [Google Scholar] [CrossRef]
  83. Yang, Miaomiao, Juanru Wang, and Xiaodi Zhang. 2021. Boundary-spanning search and sustainable competitive advantage: The mediating roles of exploratory and exploitative innovations. Journal of Business Research 127: 290–99. [Google Scholar] [CrossRef]
  84. Yang, Qian, Yi Liu, and Yuan Li. 2019. How do an alliance firm’s strategic orientations drive its knowledge acquisition? Evidence from Sino-foreign alliance partnership. Journal of Business & Industrial Marketing 34: 505–17. [Google Scholar] [CrossRef]
  85. Zeiringer, Johannes P., and Stefan Thalmann. 2022. Knowledge sharing and protection in data-centric collaborations: An exploratory study. Knowledge Management Research & Practice 20: 436–48. [Google Scholar] [CrossRef]
  86. Zhang, Da Yong, Yong Zeng, Lingyu Wang, Hongtao Li, and Yuanfeng Geng. 2011. Modeling and evaluating information leakage caused by inferences in supply chains. Computers in Industry 62: 351–63. [Google Scholar] [CrossRef]
  87. Zhao, Guohao, Rahil Irfan Ahmed, Naveed Ahmad, Cheng Yan, and Muhammad Shahjahan Usmani. 2021. Prioritizing critical success factors for sustainable energy sector in China: A DEMATEL approach. Energy Strategy Reviews 35: 100635. [Google Scholar] [CrossRef]
  88. Zhao, Xiaoting, and Liang Liang. 2011. The impact of openness on innovation performance of China’s firms: From the perspective of knowledge attributes. Paper presented at the 2011 IEEE International Conference on Industrial Engineering and Engineering Management, Singapore, December 6–9. [Google Scholar]
  89. Zhao, Xiande, Jinxing Xie, and W. J. Zhang. 2002. The impact of information sharing and ordering co-ordination on supply chain performance. Supply Chain Management: An International Journal 7: 24–40. [Google Scholar] [CrossRef]
  90. Zhou, Jia, Aifang Guo, Yutao Chen, and Jin Chen. 2022. Original Innovation through Inter-Organizational Collaboration: Empirical Evidence from University-Focused Alliance Portfolio in China. Sustainability 14: 6162. [Google Scholar] [CrossRef]
  91. Zieba, Malgorzata, Susanne Durst, and Christoph C. Hinteregger. 2022. The impact of knowledge risk management on sustainability. Journal of Knowledge Management 26: 234–58. [Google Scholar] [CrossRef]
Figure 1. Steps in the research methodology.
Figure 1. Steps in the research methodology.
Jrfm 15 00389 g001
Figure 2. ISM model.
Figure 2. ISM model.
Jrfm 15 00389 g002
Figure 3. MICMAC analysis.
Figure 3. MICMAC analysis.
Jrfm 15 00389 g003
Table 1. Literature support to the identified drivers.
Table 1. Literature support to the identified drivers.
CodesDriversDescriptionsReferences
D01DistrustNeither of the partners involved in collaborative agreements can be relied upon by the other.Qiu and Haugland (2019), Jiang et al. (2016), Yang et al. (2019), Taylor (2005), Guo et al. (2020), Deniaud et al. (2016), Fawad Sharif et al. (2020b, 2022), and Vafaei-Zadeh et al. (2020)
D02Incomplete contractsWeak or no legal contract in place to protect the core knowledge of partners involved in the collaboration.Jiang et al. (2013), Yang et al. (2019), Taylor (2005), Guo et al. (2020), Ahlfänger et al. (2022), Deniaud et al. (2016), and Fawad Sharif et al. (2020b)
D03Substandard security measuresLack or inadequate security guidelines to oversee knowledge exchange between partners in collaborative arrangements.Hislop et al. (2018), Durst and Zieba (2019), Frishammar et al. (2015), and Altukruni et al. (2021)
D04Weak BYOD policiesA lack of strict rules underpinning bring your own device (BYOD) policies could expose the focal and partner firms’ core knowledge to cyberattacks (third party).Serna et al. (2017), Shabtai et al. (2012), and Altukruni et al. (2021)
D05Insufficient technological competenceEmerging technologies used in collaborative arrangements put a firm’s core knowledge at risk of leakage due to a lack of tech know-how.Ahmad et al. (2014), Hislop et al. (2018), Jiang et al. (2013), Christina et al. (2016), Altukruni et al. (2021), and Zeiringer and Thalmann (2022)
D06Perceived opportunismPartners attempt to gain an advantage by misappropriating the core knowledge of the focal firm.Estrada et al. (2016), Norman (2002), Oxley and Wada (2009), and Fawad Sharif et al. (2020a, 2022)
D07Expected incentivesThe act of exposing core knowledge to a partner or external party for an incentive by a player in collaborative arrangements.Tan et al. (2016)
D08Existence of horizontal competitionCooperation encourages partners to take advantage of exposed core knowledge.Lee (2002), and Zhao et al. (2002)
D09Sub-contracting activitiesCooperation agreements between firms often result in subcontracting activities rather than collaborations, which often result in unknowingly transferred core knowledge.Tan et al. (2016), Foli (2022), Nishat Faisal et al. (2007), Dye and Sridhar (2003), and Zhang et al. (2011)
Table 2. Structural self-interaction matrix (SSIM).
Table 2. Structural self-interaction matrix (SSIM).
DriversD01D02D03D04D05D06D07D08D09
D01 AOOOXAXO
D02 OOOVVVV
D03 VVXXVO
D04 XVOOO
D05 VXVA
D06 XAA
D07 XA
D08 X
D09
Table 3. Initial reachability matrix.
Table 3. Initial reachability matrix.
DriversD01D02D03D04D05D06D07D08D09
D01100001010
D02110001111
D03001111110
D04000111000
D05000111110
D06101001100
D07101011110
D08100001110
D09000011101
Table 4. Final reachability matrix.
Table 4. Final reachability matrix.
DriversD01D02D03D04D05D06D07D08D09DrP
D01101 *1 *1 *11 *107
D02111 *1 *1 *11119
D031 *011111107
D041 *01 *1111 *1 *07
D051 *01 *1111107
D061011 *1 *111 *07
D071011 *111107
D08101 *1 *1 *11107
D091 *01 *1 *1111 *18
DeP919999992
* denotes transitivity relationship.
Table 5. Level partition for the drivers.
Table 5. Level partition for the drivers.
D0′sReachability Set (Rsi)Antecedent Set (Asi)Intersection Set (Isi)Level
Iteration 1
D011,3,4,5,6,7,81,2,3,4,5,6,7,8,91,3,4,5,6,7,8I
D021,2,3,4,5,6,7,8,922
D031,3,4,5,6,7,81,2,3,4,5,6,7,8,91,3,4,5,6,7,8I
D041,3,4,5,6,7,81,2,3,4,5,6,7,8,91,3,4,5,6,7,8I
D051,3,4,5,6,7,81,2,3,4,5,6,7,8,91,3,4,5,6,7,8I
D061,3,4,5,6,7,81,2,3,4,5,6,7,8,91,3,4,5,6,7,8I
D071,3,4,5,6,7,81,2,3,4,5,6,7,8,91,3,4,5,6,7,8I
D081,3,4,5,6,7,81,2,3,4,5,6,7,8,91,3,4,5,6,7,8I
D091,3,4,5,6,7,8,92,99
Iteration 2
D022,922
D0992,99II
Iteration 3
D02222III
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Foli, S.; Durst, S. Analysing Drivers of Knowledge Leakage in Collaborative Agreements: A Magnetic Processing Case Firm. J. Risk Financial Manag. 2022, 15, 389. https://doi.org/10.3390/jrfm15090389

AMA Style

Foli S, Durst S. Analysing Drivers of Knowledge Leakage in Collaborative Agreements: A Magnetic Processing Case Firm. Journal of Risk and Financial Management. 2022; 15(9):389. https://doi.org/10.3390/jrfm15090389

Chicago/Turabian Style

Foli, Samuel, and Susanne Durst. 2022. "Analysing Drivers of Knowledge Leakage in Collaborative Agreements: A Magnetic Processing Case Firm" Journal of Risk and Financial Management 15, no. 9: 389. https://doi.org/10.3390/jrfm15090389

Article Metrics

Back to TopTop