[1] استراس آ.، کوربین ج.؛ اصول روش تحقیق کیفی نظریه مبنایی رویهها و شیوهها؛ بیوک محمدی، تهران: پژوهشکده علوم انسانی و مطالعات فرهنگی، 1387.
[2] قاضی سید ناصح الدین تمیمی؛ غررالحکم و دررالکلم؛ ترجمه: محمد علی انصاری قمی، قرن پنجم.
[3] محمدپور ا.؛ فراروش: بنیانهای فلسفی و عملی روش تحقیق ترکیبی در علوم اجتماعی و رفتاری؛ تهران: جامعهشناسان، 1389.
[4] نیومن، ویلیام ، لاورنس؛ شیوههای پژوهش اجتماعی (رویکرد کمی و کیفی)، حسن داناییفرد و حسین کاظمی، تهران: مهربان نشر، 1389.
[5] Andersson L. M., Pearson C. M.;” Tit for tat? The spiraling effect of incivility in the workplace”; Academy of Management Review, Vol. 24, 1999, pp.452–471.
[6] Bartol K., Srivastava A.; "Encouraging knowledge sharing: The role of organizational reward systems"; Journal ofLeadership and Organization Studies, Vol. 19, 2002, pp. 64–76.
[7] Blau P. M.; "Exchange and power in social life"; New York, NY: John Wiley & Sons, 1964.
[8] Bock G.W., Zmud R.W., Kim Y. G., Lee J. N.; "Behavioral intention formation in knowledge sharing: Examining the roles of extrinsic motivators, social-psychological forces & organizational climate"; MIS Quarterly, Vol. 29, 2005, pp. 87–112.
[9] Carlson J. R., George J. R.; "Media appropriateness in the conduct and discovery of deceptive communication: The relative influence of richness and synchronicity"; Group Decision and Negotiation, Vol. 13, 2004, pp.191–210.
[10] Colquitt J. A., Scott B. A., LePine J. A.; "Trust, trustworthiness, and trust propensity: A meta-analytic test of their unique relationships with risk taking and job performance"; Journal of Applied Psychology, Vol. 92, 2007, pp. 909–927.
[11] Connelly Catherin E., David Zweig Jan Webster, Trougakos J. P.; Journal of organizational behavior; j. Organiz, Behave.Vol. 33, 2012, pp. 64-88
[12] Duffy M. K., Ganster D. C., Shaw J. D., Johnson J. L., Pagon M.; “The social context of undermining behavior at work”; Organizational Behavior and Human Decision Processes, Vol. 101, 2006, pp.105–126.
[13] Gattiker T. F., Huang X., Schwarz J. L.;" Negotiation, email, and Internet reverse auctions: How sourcing mechanism deployed by buyers affect suppliers’ trust"; Journal of Operations Management, Vol. 25, 2007, pp. 184–202.
[14] Gordon A. K., Miller A. G.; "Perspective differences in the construal of lies: Is deception in the eye of the beholder?" ; Personality and Social Psychology Bulletin, Vol. 26, 2000, pp. 46–55.
[15] Grazioli S.;"Where did they go wrong? An analysis of the failure of knowledgeable Internet consumers to detect deception over the Internet"; Group Decision and Negotiation, Vol. 13, 2004, pp. 149–172.
[16] Greenberg J., Brinsfield C. T., Edwards M. S.; "Silence as deviant work behavior: The peril of words unspoken"; Symposium Presented at the Annual Meeting of the Society for Industrial and Organizational Psychology, New York, NY, 2007.
[17] Hislop D.; "Mission impossible? Communicating and sharing knowledge via information technology"; Journal ofInformation Technology, 17, 2002, pp.165–177
[18] Huang X., Gattiker T. F., Schwarz J. L.; "Interpersonal trust formation during the supplier selection process: The role of the communication channel"; Journal of Supply Chain Management, Vol. 44, 2008, pp .53–75.
[19] Kankahalli A., Tan B. C. Y., Wei K.-K.; "Contributing knowledge to electronic knowledge repositories: An empirical investigation"; MIS Quarterly, Vol. 29, 2005, pp.113–143.
[20] Kelloway E. K., Barling J.; "Knowledge work as organizational behavior"; International Journal of ManagementReviews, Vol. 2, 2000, pp. 287–304.
[21] Ko D.-G., Kirsch L. J., King W. R.; Antecedents of knowledge transfer from consultants to clients in enterprise system implementations. MIS Quarterly, 29, 2005, pp. 59–85.
[22] Lewicki R. J., McAllister D. J., Bies R. J.; "Trust and distrust: New relationships and realities"; Academy of Management Review, Vol. 23, 1998, pp. 438–459.
[23] Schein E.;"Organizational culture and leadership. 3rd edition"; New York, NY: Wiley Publishers, 2004.
[24] Seiter J. S., Bruschke J., Bai C.; "The acceptability of deception as a function of perceiver’s culture, deceiver’s intention, & deceiver-deceived relationship"; Western Journal of Communication, Vol. 66, 2002, pp. 158–180.
[25] Sitkin S. B., Roth N. L.; "Explaining the limited effectiveness of legalistic ‘‘remedies’’ for trust/distrust"; Organization Science, Vol. 4, 1993, pp. 367–392.
[26] Swap W., Leonard D., Shields M., Abrams L.;"Using mentoring and storytelling to transfer knowledge in the workplace"; Journal of Management Information Systems, Vol. 18, 2001, pp. 95–114.
[27] Takala T., Urpilainen J.; "Managerial work and lying: A conceptual framework and an explorative case study"; Journal o Business Ethics, 20, 181–195 Saxe, L. 1991
[28] Wang, S., & Noe, R. A. Knowledge sharing: A review and directions for future research. Human Resource Management Review, 2010,p. 115–131
[29] Wasko M. M., Faraj S.; "Why should I share? Examining social capital and knowledge contribution in electronic networks of practice"; MIS Quarterly, Vol. 29, 2005, pp. 35–58.
[30] Webster J., Brown G., Zweig D., Connelly C. E., Brodt S., Sitkin S., 2 “Beyond knowledge sharing: Knowledge withholding at work”, Bradford: Emerald Group Publishing, Vol. 27, 2005, pp. 1–37,.
[31] Wittenbaum G. M., Hollingshead A. B., Botero I. C. “From cooperative to motivated information sharing in groups: Moving beyond the hidden profile paradigm”. Communication Monographs, 71, 2004, pp. 286–310.
[32] Yukl G., Kim H., Falbe C. M.; "Antecedents of influence outcomes";. Journal of Applied Psychology, Vol. 81, 1996, pp. 309–317.