LOGIN TO YOUR ACCOUNT

Username
Password
Remember Me
Or use your Academic/Social account:

CREATE AN ACCOUNT

Or use your Academic/Social account:

Congratulations!

You have just completed your registration at OpenAire.

Before you can login to the site, you will need to activate your account. An e-mail will be sent to you with the proper instructions.

Important!

Please note that this site is currently undergoing Beta testing.
Any new content you create is not guaranteed to be present to the final version of the site upon release.

Thank you for your patience,
OpenAire Dev Team.

Close This Message

CREATE AN ACCOUNT

Name:
Username:
Password:
Verify Password:
E-mail:
Verify E-mail:
*All Fields Are Required.
Please Verify You Are Human:
fbtwitterlinkedinvimeoflicker grey 14rssslideshare1
Matheus, Thomas; Sarma, Meera (2015)
Publisher: Atlantis Press
Languages: English
Types: Article
Subjects: G500, N200
This paper offers an exploratory conceptual and theoretical examination of knowledge creation within virtual communities of hackers. By distinguishing between different types of virtual communities, we argue that hacker communities involved in free and open source activities possess special structural and processual characteristics that are conducive to innovative product development. Drawing on diverse literatures, this paper thus builds an initial understanding of how a hacker community is organized and how knowledge creation and innovation occur in the hybrid virtual environment.
  • The results below are discovered through our pilot algorithms. Let us know how we are doing!

    • M. Klang and S. Olsson, in Proceedings of the Fourth International Workshop on CSCW (France, 1999).
    • L. Jeppesen and L. Frederiksen, Organization Science 17 (1), 45-63 (2006).
    • S. Faraj, S. Jarvenpaa and A. Majchrzak, Organisation Science 22 (5), 1224-1239 (2011).
    • A. Subramanian and P. Soh, in PACIS 2006 Proceedings (Kuala-Lumpur, 2006), pp. 914-925.
    • F. De Cindio, O. Gentile, P. Grew and D. Redolfi, Information Society 19 (5), 395-406 (2003).
    • S. Brint, Sociological Theory 19 (1), 1-23 (2001).
    • S. Gupta and H. Kim, in Proceedings of the Tenth Americas Conference on Information SystemsAMCIS (New York, 2004), pp. 2679-2687.
    • J. Lave and E. Wenger, Situated learning: Legitimate peripheral participation. (Cambridge University Press, Cambridge, 1991).
    • S. Pan and D. Leidner, Strategic Information Systems 12, 71-88 (2003).
    • P. Hildreth and C. Kimble, Information Research 8 (1), 30 (2002).
    • D. Mahr and A. Lievens, Research Policy 41 (1), 167-177 (2012).
    • J. Füller, G. Jawecki and H. Mühlbacher, Journal of Business Research 60 (1), 60-71 (2007).
    • A. Correia, A. Paulos and A. Mesquita, Electronic Journal of Knowledge Management 8 (1), 11-20, available online at http://www.ejkm com (2010).
    • I. Nonaka, Organization Science 5 (1), 14-37 (1994).
    • N. Sinclair, F. Martin-Niemi and R. Greatbanks, VINE 40 (1), 7-23 (2010).
    • S. Hosseini, Asia Pacific Education Review 12 (2), 263-270 (2011).
    • K. Hafeez and F. Alghatas, Electronic Journal of Knowledge Management 5 (1), 29-42 (2007).
    • G. Lee and R. Cole, Organization Science 14 (6), 633-649 (2003).
    • S. Chou and Y. Chang, presented at the Hawaii International Conference on System Sciences, Proceedings of the 41st Annual, 2008 (unpublished).
    • A. Hemetsberger and C. Reinhardt, presented at the OKLC, Innsbruck, 2004 (unpublished).
    • D. A. Schön, The reflective practitioner. (Basic Books, New York, 1983).
    • A. Hemetsberger and C. Reinhardt, Management Learning 37 (2), 187-214 (2006).
    • M. Sarma and T. Matheus, Technology Analysis & Strategic Management 27 (5), 569-585 (2015).
    • A. Van de Ven and M. Poole, Academy of Management Review 20 (3), 510-540 (1995).
    • H. Nissenbaum, New Media & Society 6 (2), 195- 217 (2004).
    • J. Lazar, R. Tsao and J. Preece, WebNet Journal: Internet Technologies, Applications & Issues 3, 49- 57 (1999).
    • S. Levy, Hackers: Heroes of the Computer Revolution. (Bantam Doubleday Bell, New York, 1984).
    • P. Taylor, New Media Society 7, 625-646 (2005).
    • E. Raymond, The new hacker's dictionary. (Mit Press, Cambridge, 1996).
    • (Routledge, London, 1999).
    • T. Jordan and P. Taylor, The Sociological Review 46 (4), 757-780 (1998).
    • M. Rogers, in Telematic Journal of Clinical Criminology (2000).
    • A. Chandler, International Journal of the Sociology of Law 24, 229-251 (1996).
    • E. Von Hippel and G. Von Krogh, Organization Science 14 (2), 209-215 (2003).
    • E. Raymond, The Cathedral the Bazaar. (O'Reilly, Cambridge, 2001).
    • R. Hollinger, Computers and Society 21 (1), 6-16 (1991).
    • O. Goldschmidt, Social Science Computer Review 23 (1), 8-23 (2005).
    • Fitzgerald, S. Hissam and K. Lakhani (MIT Press, Cambridge, 2005), pp. 3-22.
    • M. Bergquist and J. Ljungberg, Information Systems Journal 11, 305-320 (2001).
    • Y. Lin, Ubiquity 4 (4), 18-24 (2003).
    • (Harvard Business School Press, Boston, 1997).
    • U. Markus, (SAP Design Guild, 2002).
    • R. Kozinets, Journal of Consumer Research 39 (1), 61-72 (2002).
    • M. Ahuja and K. Carley, Organization Science 10 (6), 741-757 (1999).
    • G. von Krogh, S. Spaeth and K. Lakhani, Research Policy 32 (9), 1217-1241 (2003).
    • J. Lazar and J. Preece, in Proceedings of the Association for Information Systems (Baltimore, 1998), pp. 84-86.
    • J. Gläser, in TASA Conference (Sydney, 2001).
    • J. Brown and P. Duguid, Organization Science 2 (1), 40-57 (1991).
    • K. Lakhani and E. von Hippel, Research Policy 32, 923-943 (2003).
    • K. Crowston and J. Howison, in The IFIP 8.2 Working Group on Information Systems in Organizations Organizations and Society in Information Systems (Seattle, 2003).
    • Y. Ye and K. Kishida, presented at the International Conference on Software Engineering, Portland, 2003 (unpublished).
    • R. Ghosh and V. Prakash, First Monday 5 (7) (2000).
    • K. Healy and A. Schussman, (University of Arizona, Tuscon, 2003).
    • A. Mockus, R. Fielding and J. Herbsleb, ACM Transactions on Software Engineering and Methodology (TOSEM) 11 (3), 309 - 346 (2002).
    • S. Borgatti and M. Everett, Social Networks 21 (4), 375-395 (2000).
    • J. Koh and Y. Kim, Expert Systems with Applications 26 (2), 155-166 (2004).
    • M. Granovetter, Sociological Theory 1, 201-233 (1983).
    • E. Von Hippel, (MIT, Cambridge, 2002).
    • Swan, Managing knowledge work and innovation, 2nd ed. (Palgrave, Basingstoke, 2009).
    • J. Meyers, MIS Quarterly 21 (2), 241-242 (1997).
    • W. Orlikowski, MIS Quarterly 17, 309-340 (1993).
  • No related research data.
  • No similar publications.

Share - Bookmark

Cite this article