Workplace ostracism and employee silence: an identity-based perspective

被引:19
|
作者
Sahabuddin, Md [1 ]
Tan, Qingmei [1 ]
Ayub, Arslan [2 ]
Fatima, Tehreem [2 ]
Ishaq, Mustafa [3 ]
Khan, Ali Junaid [4 ]
机构
[1] Nanjing Univ Aeronaut & Astronaut NUAA, Coll Econ & Management, Nanjing, Peoples R China
[2] Univ Lahore, Lahore Business Sch, Sargodha, Pakistan
[3] Univ Educ, Faisalabad, Pakistan
[4] Islamia Univ Bahawalpur, Inst Business Management & Adm Sci, Bahawalpur, Pakistan
关键词
Workplace ostracism; Employee silence; Moral identification; Organizational identification; Job performance; MODERATED MEDIATION MODEL; ABUSIVE SUPERVISION; SOCIAL IDENTITY; POLITICAL SKILL; SELF; RESOURCES; VOICE; CONSERVATION; IDENTIFICATION; ORGANIZATIONS;
D O I
10.1108/K-04-2021-0306
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Purpose Extant research has shown that workplace ostracism (WO) elicits counterproductive work behaviors, such as employee silence (ES), culminating in reduced job performance. However, lesser is known about the factors that buffer against this underlying linkage. With an emphasis on conservation of resource (COR) theory and social identity theory, this study investigates the hitherto unexplored moderating roles of moral identification (MI) and organizational identification (OI) in the relationship between WO and ES. Design/methodology/approach The study employed a time-lagged design to collect multi-source data from 250 employees working in the service sector organizations in Pakistan. Data are analyzed in SMARTPLS (v 3.3.3) to assess the measurement model and the structural model. Findings Results reveal that WO is positively correlated with ES and negatively correlated with job performance. At the same time, ES mediates the negative relationship between WO and job performance. In addition, MI and OI buffer against the positive connection between WO and ES. The positive association between WO and ES is less pronounced at high levels of MI and OI and vice versa. Practical implications The findings indicate that there is potential value in developing MI and OI, for which several interventions are discussed. Originality/value This study is one of the few efforts to outstretch the boundary conditions of ES. Moreover, this is the first study to investigate the role of identity-based perspective in the relationship between WO and ES.
引用
收藏
页码:97 / 120
页数:24
相关论文
共 50 条
  • [31] Understanding Knowledge Sharing From an Identity-Based Motivational Perspective
    Burmeister, Anne
    Song, Yifan
    Wang, Mo
    Hirschi, Andreas
    JOURNAL OF MANAGEMENT, 2024,
  • [32] Coping with Workplace Ostracism: The Roles of Ingratiation and Political Skill in Employee Psychological Distress
    Wu, Long-Zeng
    Yim, Frederick Hong-kit
    Kwan, Ho Kwong
    Zhang, Xiaomeng
    JOURNAL OF MANAGEMENT STUDIES, 2012, 49 (01) : 178 - 199
  • [33] Workplace Ostracism and Employee Creativity: An Integrative Approach Incorporating Pragmatic and Engagement Roles
    Kwan, Ho Kwong
    Zhang, Xiaomeng
    Liu, Jun
    Lee, Cynthia
    JOURNAL OF APPLIED PSYCHOLOGY, 2018, 103 (12) : 1358 - 1366
  • [34] Will my own perception be enough?: A multilevel investigation of workplace ostracism on employee voice
    Wu, Wen
    Wang, Haihua
    Lu, Lu
    CHINESE MANAGEMENT STUDIES, 2018, 12 (01) : 202 - 221
  • [35] Effect of workplace ostracism on employee initiative behaviour: a chained double mediation model
    Cheng, Chun
    Ma, Jianfeng
    JOURNAL OF MANAGERIAL PSYCHOLOGY, 2022, 37 (08) : 765 - 778
  • [36] Identity-based proof of retrievability meets with identity-based network coding
    Chen, Yixin
    Chang, Jinyong
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2022, 25 (05): : 3067 - 3083
  • [37] Paradox mindset as an equalizer: A moderated mediated perspective on workplace ostracism
    Ahmad, Alina
    Saleem, Sharjeel
    Shabbir, Rizwan
    Qamar, Beenish
    PLOS ONE, 2024, 19 (02):
  • [38] Threshold Identity-Based Broadcast Encryption from Identity-Based Encryption
    Kim, Kitak
    Kim, Milyoung
    Kim, Hyoseung
    Park, Jon Hwan
    Lee, Dong Hoon
    COMPUTER APPLICATIONS FOR DATABASE, EDUCATION, AND UBIQUITOUS COMPUTING, 2012, 352 : 99 - 102
  • [39] Identity-based proof of retrievability meets with identity-based network coding
    Yixin Chen
    Jinyong Chang
    Cluster Computing, 2022, 25 : 3067 - 3083
  • [40] Smell of silence - Psychological contract breach as a mediator between workplace bullying and employee silence
    Kusum, Kamini
    Yadav, Anshu
    Shweta
    Prakash, Shakti
    JOURNAL OF STATISTICS AND MANAGEMENT SYSTEMS, 2023, 26 (05) : 1211 - 1221