- Business School, Shandong Normal University, Jinan, China
This four-wave longitudinal study reframes unnecessary and unreasonable tasks as relational stimuli. Latent change score modeling on 250 employees (1 month intervals) showed that within-person increases in unnecessary tasks heightened knowledge hiding (β = 0.30-0.32), which subsequently eroded task performance (indirect effect = −0.12 to−0.14). Unreasonable tasks exerted comparable indirect harm (indirect = −0.11 to−0.12) but carried no significant direct effect on performance (β = −0.08, p = 0.183). Thus, both forms of illegitimate tasks damage later performance solely through the amplification of knowledge hiding, challenging static “stressor–strain” assumptions and underscoring the need to curb defective task design before collaborative exchanges are undermined.
Introduction
Organizations continue to grapple with the persistent problem of “bad jobs” that expose employees to work characteristics widely regarded as detrimental—namely, tasks that are redundant, illogical, or impossible to execute properly (Oldham and Hackman, 2010). Two under-studied yet increasingly salient facets are unnecessary tasks (i.e., redundant or meaningless work that serves no value-added purpose) and unreasonable tasks (i.e., assignments that violate logic, feasibility, or ethical standards). While cross-sectional studies typically treat such demands as classic hindrance stressors that erode motivation and performance (Cavanaugh et al., 2000), employees in modern knowledge contexts often cannot simply withdraw; instead, they must find real-time solutions to complete the work (Tan et al., 2024). Understanding how these problematic demands unfold over time and whether they can spark collaborative coping behaviors is therefore critical for both theory and practice.
Extant research on hindrance demands has relied heavily on between-person, static designs that compare individuals high vs. low on perceived hindrances (Podsakoff et al., 2007). Consequently, we know little about within-person dynamics: do rises in unnecessary or unreasonable tasks prompt employees to share knowledge more frequently, and does such collaboration ultimately sustain task performance? A handful of qualitative studies hint that bureaucratic burdens may unintentionally foster mutual assistance (Grant and Ashford, 2008), but longitudinal, quantitative evidence is absent. Moreover, the challenge-hindrance appraisal framework has recently been re-conceptualized as a dynamic process wherein individuals reappraise initially obstructive demands as challenges or as solvable via collective action (Rodell and Judge, 2009). Yet this theoretical pivot awaits empirical tests capable of modeling intra-individual change while separating initial levels from growth trajectories.
Additionally, prior studies have often conflated different types of hindrance demands, overlooking their dimension-specific effects (Webster et al., 2010). For example, unnecessary tasks may be perceived as more controllable than unreasonable tasks, leading to different coping strategies (Lazarus and Folkman, 1984). Furthermore, knowledge hiding has been identified as a key behavioral mechanism through which employees mitigate work stressors (Wang and Noe, 2010), yet its longitudinal role in response to task design flaws remains underexplored. Finally, most job design research has focused on static outcomes such as job satisfaction or burnout, rather than dynamic performance trajectories (Parker et al., 2017).
To address these gaps, we collected four waves of survey data from 250 knowledge workers at 3 month intervals and applied bivariate latent change score modeling (LCSM) (McArdle, 2009). LCSM decomposes observed scores into an initial level and a latent change factor for each construct, thereby offering a rigorous test of how within-person increases in unnecessary and unreasonable tasks predict corresponding changes in knowledge hiding and subsequent task performance (Kruk et al., 2023). Grounded in challenge-hindrance appraisal theory, we argue that employees who experience growing unnecessary work will appraise it as a controllable hindrance and engage in knowledge hiding as a proactive workaround; in contrast, escalating unreasonable tasks—perceived as less controllable—will evoke direct, effortful problem solving rather than collaborative exchange. We further integrate Conservation of Resources (COR) theory (Hobfoll, 1989) to posit that employees invest in knowledge hiding as a resource-generating strategy to prevent further loss of time and energy. Meanwhile, social functionalism (Durkheim and Coser, 1998) suggests that institutional deficiencies (e.g., poor task design) activate informal adversity-driven defensive withdrawal to maintain system functionality. Thus, we expect different temporal pathways for unnecessary vs. unreasonable tasks.
This study addresses the following question: Do within-person increases in illegitimate tasks (unnecessary vs. unreasonable) trigger knowledge hiding, and does this behavioral response subsequently erode task performance over time? We propose that both task types, by violating implicit contracts about meaningful work, will activate resource-protection motives leading to knowledge concealment. Figure 1 illustrates our latent change score model, which disaggregates between-person and within-person variance to test temporal mediation. By modeling intra-individual change across 4 monthly waves, we provide a dynamic test of how “bad tasks” become performance liabilities through the micro-mechanism of knowledge hiding.
The present study makes four primary contributions. First, by modeling intra-individual change rather than between-person differences, we provide the first longitudinal evidence that “bad tasks” can generate functional, collaborative behaviors over time, refining the predominantly static challenge-hindrance literature (Rodell and Judge, 2009). Second, we unpack the dimension-specific effects of unnecessary vs. unreasonable tasks, demonstrating that only the former stimulates knowledge hiding, whereas the latter lifts performance through a direct, non-collaborative pathway. Third, our use of LCSM advances methodology in job design research by explicitly separating baseline levels from dynamic slopes, thereby offering stronger causal inference regarding the temporal ordering of demands, sharing behaviors, and performance outcomes (McArdle, 2009). Finally, we integrate COR theory and social functionalism to explain why employees convert task adversity into collective gain, offering a multi-level theoretical account of “adversity-driven collaboration” in contemporary organizations.
Theory and hypotheses
Theoretical foundation
Recent advances (2020–2024) have refined our understanding of illegitimate tasks and knowledge dynamics. Meta-analytic evidence (Pindek et al., 2021) confirms illegitimate tasks as robust predictors of counterproductive work behaviors (Yuan and Yan, 2024), while daily diary studies (Gabriel et al., 2023) reveal their dynamic spillover effects. Regarding knowledge hiding, Grošelj et al. (2020) meta-analysis (k = 65, N = 21,000) identifies perceived organizational injustice as a primary antecedent, with stronger effects in high power-distance cultures (Jiang et al., 2023). Critically, Katz et al. (2023) reconceptualize illegitimate tasks as “stress-as-offense-to-self,” emphasizing resource threat over challenge appraisal. These dynamic perspectives highlight a crucial gap: no longitudinal study has modeled within-person change processes linking illegitimate tasks, knowledge hiding, and performance trajectories using latent change score modeling (LCSM), which offers stronger causal inference than cross-lagged panels (Hamaker et al., 2015; Kottwitz et al., 2025).
This study integrates challenge-hindrance appraisal theory (Cavanaugh et al., 2000; Rodell and Judge, 2009) with Conservation of Resources (COR) theory (Hobfoll, 1989) and social functionalism (Durkheim and Coser, 1998) to explain why within-person increases in two forms of “bad” tasks—unnecessary vs. unreasonable—activate distinct behavioral pathways that ultimately influence task performance. Challenge-hindrance theory posits that stressful demands are interpreted as either controllable hindrances or uncontrollable threats; controllable hindrances stimulate proactive, collaborative coping, whereas uncontrollable hindrances elicit direct or solitary effort (Rodell and Judge, 2009). COR theory adds that employees invest existing resources (e.g., expertise) to generate new resources (e.g., social support) when threatened (Hobfoll, 1989). Social functionalism further contends that institutional deficiencies (e.g., poor task design) trigger informal adversity-driven defensive withdrawal to maintain system functionality (Durkheim and Coser, 1998). Synthesizing these perspectives, we propose an asymmetric mediation model in which knowledge hiding change transmits the effect of unnecessary-task change, but not unreasonable-task change, to performance change.
Unnecessary tasks and knowledge-hiding change
Challenge-hindrance appraisal theory contends that when employees encounter job demands they perceive as controllable, they are inclined to interpret them as surmountable hindrances rather than threats (Cavanaugh et al., 2000; Rodell and Judge, 2009). Unnecessary tasks—work that is redundant, low-value, or bureaucratic—precisely fit this appraisal profile because individuals believe the waste can be reduced through better coordination (Webster et al., 2010). From a conservation-of-resources (COR) perspective, such appraisals trigger proactive investment of existing resources (time, expertise) to generate new resources (social support, reciprocity) that prevent further resource drain (Hobfoll, 1989). Knowledge hiding represents a low-cost, high-leverage investment: exchanging tips, templates, or work-arounds can eliminate duplicated effort and simultaneously build interpersonal resources (Wang and Noe, 2010). Recent experience-sampling studies show that daily fluctuations in redundant work predict same-day elevations in help-seeking and information giving (Koopman et al., 2016), while a three-wave panel found that employees who reported increasing bureaucratic demands subsequently increased collaborative problem-solving (Tims et al., 2015). Because unnecessary tasks are appraised as controllable and remediable, within-person increases should stimulate individuals to pool collective knowledge.
H1: Within-person increases in unnecessary tasks will be positively related to within-person increases in knowledge hiding.
Unreasonable tasks and knowledge hiding change
Unreasonable tasks—assignments that are illogical, ethically dubious, or impossible to complete satisfactorily—are typically appraised as low in controllability and high in self-threat (Lazarus and Folkman, 1984). Challenge-hindrance theory predicts that when hindrances are viewed as uncontrollable, employees shift from collaborative sense-making to direct compliance or private problem-solving in order to avoid blame or reputational damage (Pham Thi and Duong, 2024; Rodell and Judge, 2009). COR theory adds that under high threat and low control, individuals conserve rather than expend resources; sharing proprietary knowledge may be judged too risky if the assignment itself is irrational (Hobfoll, 1989). Longitudinal evidence supports this reasoning: a four-wave study found that rises in illegitimate tasks did not predict subsequent collegial helping but did predict solitary extra-role effort (Eatough et al., 2015). Similarly, an experience-sampling investigation showed that daily unreasonable requests increased employees' silent compliance behaviors while decreasing cooperative voice (Koopman et al., 2016). Consequently, within-person growth in unreasonable tasks should not elicit greater knowledge hiding.
H2: Within-person increases in unreasonable tasks will NOT be significantly related to within-person increases in knowledge hiding.
Knowledge hiding change and task-performance change
Knowledge hiding delivers three performance-relevant resources: diversified solution sets, rapid error correction, and socio-emotional support that sustains self-efficacy (Wang and Noe, 2010). Meta-analytic evidence indicates that individual-level knowledge-hiding behaviors correlate ρ = 0.34 with supervisor-rated task performance (Låstad et al., 2025). Longitudinally, a four-wave study of R&D engineers revealed that within-person increases in daily knowledge hiding predicted objective project output 3 months later (Tims et al., 2015). From a social-functionalism angle, informal knowledge exchange functions as a micro-repair mechanism that compensates for formal system defects (Durkheim and Coser, 1998); when employees pool know-how, they shorten learning curves and reduce redundant iterations, thereby maintaining output quality even under sub-optimal task conditions. Thus, as individuals share more knowledge over time, their own task performance should improve.
H3: Within-person increases in knowledge hiding will be positively related to within-person increases in task performance.
Mediating role of knowledge-hiding change
Building on the logic developed in H1–H3, we argue that knowledge-hiding change functions as a key behavioral conduit through which escalating unnecessary tasks translate into performance gains, whereas unreasonable tasks bypass this collaborative route and exert only a direct effect on performance.
First, unnecessary tasks are appraised as controllable hindrances that can be alleviated through joint sense-making (Rodell and Judge, 2009). When employees experience a within-person uptick in redundant or low-value work, they proactively exchange templates, short-cuts, and coordination scripts to eliminate duplication (Kunzelmann et al., 2025; Wang and Noe, 2010). This incremental knowledge pooling shortens task completion time, reduces error rates, and signals cooperative intent to supervisors—objective and symbolic benefits that feed directly into performance evaluations (Låstad et al., 2025). Longitudinal evidence supports this causal chain: a four-wave panel of R&D engineers revealed that increases in daily knowledge hiding predicted supervisor-rated performance 3 months later (Tims et al., 2015). Thus, knowledge-hiding change should statistically mediate the effect of unnecessary-task change on performance change.
Second, unreasonable tasks are appraised as uncontrollable and self-threatening (Lazarus and Folkman, 1984). Employees respond with private, effortful compliance rather than open collaboration, fearing that public questioning may damage credibility (Eatough et al., 2015; Schilbach et al., 2023). Because knowledge-hiding change is not significantly triggered by unreasonable-task change (cf. H2), an indirect effect through this pathway is unlikely. Instead, unreasonable tasks may elevate performance through alternative mechanisms such as impression management or intensive solo problem-solving (Webster et al., 2010).
Taken together, we propose an asymmetric mediation model: knowledge-hiding change transmits the benefits of unnecessary tasks but not of unreasonable tasks to performance.
H4a: Within-person increases in knowledge hiding will mediate the positive relationship between within-person increases in unnecessary tasks and task-performance change.
H4b: The indirect effect of unreasonable-task change on performance change via knowledge-hiding change will be non-significant.
Research design
Participants and procedure
The data collection process can be summarized into the following steps: Firstly, the translation and simplification of the scale. The accuracy and original meaning of the scale are ensured through the translation and back-translation process. At the same time, to reduce the burden on participants and improve the quality of the responses, a simplified version of the scale was used for the knowledge hiding behavior.
Secondly, the research design and selection of research subjects. To facilitate sampling, full-time employees from 18 companies- selected by two-stage stratified random sampling (18 firms drawn from the provincial register followed by 10-30 employees per firm chosen via anonymized rosters)- were randomly selected as the subjects of the survey. Each company conducted the survey through the head of the human resources department, with a sample size ranging from 3 to 30 people, including positions such as marketing, research and development, production, administration, finance, etc. The human resources department obtained the consent of the participants to ensure voluntary participation. To ensure the confidentiality of the survey data, all participants were identified only by a unique ID.
Next, the pre-survey and screening. The pre-survey was conducted on the last working day of the second week in April, and confirmation was made the next day for those who did not respond. Information such as gender, age, education level, work experience, job category, job level, and company type were collected, and a total of 350 people were solicited to fill out the questionnaire.
Next, the data collection time and method. The first formal collection was on the last working day of the third week in May, with a requirement to complete it before Saturday, collecting other questions except for demographic variables, and after matching, a total of 337 valid questionnaires were received; a month later, based on the first valid sample, the second formal collection was on the last working day of the third week in June, with a requirement to complete it before Saturday, collecting other questions except for demographic variables, and after matching, a total of 317 valid questionnaires were received; another month later, based on the second valid sample, the third formal collection was on the last working day of the third week in July, with a requirement to complete it before Saturday, collecting other questions except for demographic variables, and after matching, a total of 251 valid questionnaires were received; for all surveys, matching was done through a unique ID, and it was set that only one questionnaire could be filled per IP.
Finally, reducing sample loss and reward mechanism. Unqualified questionnaires were excluded based on the following criteria: attention test questions, such as selecting Beijing as the capital; short filling time, such as less than 2 mins; random filling, such as all options being the same; whether they participated in the previous round of the survey. To encourage serious and responsible completion, each participant received a cash red envelope reward of 10-15 yuan after completing the questionnaire each time.
Variables measurement
All the measures were translated from English to Chinese following the translation-back translation procedure by Brislin (1980).
Illegitimate Task. Illegitimate tasks consist of two dimensions: unnecessary tasks and unreasonable tasks. These are measured using an 8-item scale developed by (Semmer et al., 2010), where participants are asked to make choices on a 5-point scale (ranging from 1 for “strongly disagree” to 5 for “strongly agree”). Unnecessary tasks include four items, such as “I have to deal with tasks that are completely unnecessary” and “I have to deal with tasks that are entirely meaningless.” The Cronbach's alpha for these four measurements was 0.89, 0.90, 0.88, and 0.89, respectively; unreasonable tasks also include four items, such as “I have to deal with tasks that should be done by someone else” and “I have to deal with tasks that are irrelevant to me and should not be my responsibility.” The Cronbach's alpha for these four measurements was 0.91, 0.92, 0.93, and 0.94, respectively.
Knowledge Hiding Behavior. Knowledge hiding behavior is measured using a modified scale developed by (Rhee and Choi, 2016), where leaders are asked to rate their subordinates' behavior on a 5-point scale (ranging from 1 for “completely non-compliant” to 5 for “fully compliant,”) including four items, such as “Promises to inform the subordinate, but actually has no intention of doing so” and “Even though the subordinate knows this information, they might claim not to know.” The Cronbach's alpha for these four measurements was 0.91, 0.92, 0.90, and 0.91, respectively.
Task Performance. Task performance is measured using a modified scale developed by (Van Dyne and LePine, 1998), where leaders are asked to rate their subordinates' performance on a 5-point scale (ranging from 1 for “completely non-compliant” to 5 for “fully compliant”), including four items, such as “Fully completes the assigned work tasks” and “Work performance meets job performance standards.” The Cronbach's alpha for these four measurements was 0.96, 0.95, 0.94, and 0.94, respectively.
Analytic strategies
We specified a bivariate latent change score model (McArdle, 2009) in Mplus 8.8 following four analytic steps. Power analysis using Monte Carlo simulation (Mplus) indicated that N = 250 provides 0.89 power to detect the observed indirect effect (β = −0.12) at α = 0.05. This exceeds the minimum N = 200 recommended for LCSM with four indicators per construct. First, a longitudinal measurement model was estimated in which each wave-specific latent factor was indicated by its four manifest items, factor loadings were fixed to 1, and residual variances were constrained to equality across time to ensure metric invariance. Second, latent change factors were created by regressing each construct's level factor on itself at adjacent waves and freely estimating the slope factor with loadings 0, 1, 2, and 3, thereby modeling constant rate of change. Third, the structural model regressed the knowledge-hiding slope and the task-performance slope on both the unnecessary-task slope and the unreasonable-task slope, while control variables (gender, age, education, organizational tenure) were included as predictors of all initial-level factors and latent change slopes to account for demographic influences on baseline perceptions and change trajectories. Finally, parameters were estimated with the robust maximum-likelihood estimator (MLR) to correct for non-normality, and missing values were handled by full-information maximum-likelihood (Enders, 2010).
Data analysis
Descriptive statistics, construct validity, and longitudinal measurement invariance
Table 1 presents the descriptive statistics and zero-order correlations for the 250 valid cases across the four waves (T1–T4). Overall, the mean levels of unnecessary tasks (UT) and unreasonable tasks (UnT) remained relatively stable over time, with UT means ranging from 3.03 to 3.11 and UnT means ranging from 2.93 to 2.97. Standard deviations were approximately 1.0 for both constructs, and Cronbach's α coefficients ranged from 0.88 to 0.89, indicating good internal consistency.
Knowledge hiding behavior (KHB) also showed temporal stability, with means ranging from 2.05 to 2.17 and standard deviations around 0.82-0.86. Cronbach's α values were consistently 0.87-0.88, suggesting reliable measurement. Task performance (TP) demonstrated a slight upward trend, with means increasing from 3.97 at T1 to 4.05 at T3, and remaining stable at 4.03 at T4. Standard deviations were lower than for other constructs (0.57-0.76), and α coefficients were 0.90 across all waves, indicating high reliability.
Longitudinal correlations revealed strong within-construct stability over time. Adjacent-wave correlations for UT, UnT, KHB, and TP ranged from 0.60 to 0.82 (p < 0.01), demonstrating high temporal consistency. Cross-construct correlations showed that both UT and UnT were positively and significantly correlated with KHB (r = 0.19-0.44, p < 0.01), and negatively correlated with TP (r = −0.03 to−0.30, p < 0.05 or p < 0.01), supporting the hypothesized detrimental effects of illegitimate tasks on employee behaviors and performance.
Among the control variables, gender showed weak but significant negative correlations with KHB at T1 and T2 (r = −0.15 to −0.19, p < 0.05 or p < 0.01), and positive correlations with TP at T1 and T2 (r = 0.15-0.16, p < 0.05). Age was weakly and negatively associated with UT and UnT at several time points (r = −0.10 to −0.16, p < 0.05), and also negatively correlated with KHB at T3 and T4. Education showed minimal correlations with core variables, mostly non-significant.
In sum, the measures demonstrated strong reliability and stability over time. The correlation patterns provide preliminary support for the proposed relationships among illegitimate tasks, knowledge hiding, and task performance, while control variables exerted minimal influence, laying a solid foundation for subsequent longitudinal analyses.
Table 2 compiles the CFA competitive-model tests of discriminant validity for the four key constructs—unnecessary tasks (UT), unreasonable tasks (UnT), knowledge-hiding behavior (KHB) and task performance (TP)—at each wave. The baseline four-factor solution fitted the data excellently throughout (χ2 (59) = 109.8-121.7; CFI/TLI ≥ 0.972/0.966; RMSEA ≤ 0.043; SRMR ≤ 0.039). Collapsing UT and UnT into a single factor yielded a significant Δχ2 (df = 3) of 288.7-298.4 (p < 0.001), accompanied by CFI/TLI drops of ≈ 0.09 and RMSEA/SRMR increases to ≈ 0.09/0.07. A two-factor model (all task indicators vs. all outcome indicators) produced Δχ2 (df = 5) ≈ 702–728 (p < 0.001), CFI/TLI < 0.80, RMSEA ≈ 0.13 and SRMR ≈ 0.09. The one-factor solution fared worst, with Δχ2 (df = 6) ≈ 1,315-1,378 (p < 0.001), CFI ≈ 0.65, RMSEA ≈ 0.17-0.18 and SRMR ≈ 0.12. These consistent, wave-to-wave deteriorations confirm that the four constructs cannot be reduced to fewer factors, establishing strong discriminant validity and providing a reliable measurement foundation for subsequent longitudinal analyses.
Table 3 summarizes the longitudinal measurement-invariance sequence (configural → metric → scalar → strict) for the four latent constructs—unnecessary tasks (UT), unreasonable tasks (UnT), knowledge sharing (KH) and task performance (TP)—across the four waves (N = 250, MLR estimator). At the configural step all factors already exhibited excellent fit: CFI ≥ 0.990 and RMSEA ≤ 0.039. Progressively tightening constraints produced only negligible deterioration. For every construct the move from configural to metric, metric to scalar, and scalar to strict yielded |ΔCFI| ≤ 0.003 and |ΔRMSEA| ≤ 0.002—well below the pragmatic cut-offs of 0.01 and 0.015, respectively. Satorra-Bentler corrected Δχ2 values were statistically significant in some steps, yet the absolute Δχ2/df ratios remained <3 and the practical fit indices stayed in the superior range (CFI ≥ 0.981, RMSEA ≤ 0.044) even under the strictest model. Thus all four constructs achieve full longitudinal measurement invariance, ensuring that subsequent latent-change and mediation analyses are not confounded by measurement non-equivalence.
Hypotheses testing
Table 4 shows that the latent-change-score model fitted the data well (CFI/TLI > 0.96, RMSEA = 0.042, SRMR = 0.039). None of the control variables (gender, age, education, tenure) reached significance. All four substantive paths were significant and in the expected direction. Both unnecessary tasks [β = 0.32, p < 0.001, 95% CI (0.16, 0.48)] and unreasonable tasks [β = 0.29, p < 0.001, 95% CI (0.15, 0.43)] positively predicted subsequent increases in knowledge hiding, supporting H1. In turn, rising knowledge hiding negatively forecasted changes in task performance [β = −0.41, p < 0.001, 95% CI (-0.59,−0.23)], supporting H2. By contrast, the direct paths from unnecessary tasks (β = −0.10, p = 0.095) and unreasonable tasks (β = −0.08, p = 0.183) to changes in task performance were non-significant, indicating full mediation via knowledge hiding. The effect sizes are medium, suggesting that illegitimate tasks erode employees' task performance over time chiefly by stimulating knowledge-hiding behavior.
A 20,000-draw Monte-Carlo simulation was used to estimate the longitudinal indirect effects (Table 5). The indirect effect of unnecessary tasks on subsequent task-performance change through increased knowledge hiding was−0.13 [-0.21,−0.06], and the analogous indirect effect for unreasonable tasks was−0.12 [-0.20,−0.05]. Because both 95% confidence intervals exclude zero, the indirect pathways are statistically significant, corroborating the mediating role of knowledge hiding. The two indirect effects are virtually identical in magnitude, indicating that both forms of illegitimate tasks undermine later task performance to the same extent by stimulating employees' knowledge-hiding behavior.
Supplementary analysis
Reverse-order LCS models and rival-predictor checks corroborate the causal ordering of the main model (Table 6). When the alternative sequence “change in task performance → change in knowledge hiding → illegitimate tasks” was estimated, all reverse paths were non-significant: Δ Task Performance → Δ Knowledge Hiding [β = −0.06, 95 % CI (-0.16, 0.04), p = 0.274], Δ Knowledge Hiding → Unnecessary Tasks-T4 [β = 0.05, 95 % CI (-0.05, 0.15), p = 0.312], and Δ Knowledge Hiding → Unreasonable Tasks-T4 (β = 0.04, 95 % CI [-0.04, 0.12], p = 0.398). The model fit was acceptable (χ2/df = 2.31, CFI = 0.970, TLI = 0.964, RMSEA = 0.045, SRMR = 0.040), yet the lack of credible effects rules out the possibility that employees elevated illegitimate-task perceptions because prior performance declined. These results reinforce the originally hypothesized direction: illegitimate tasks → knowledge-hiding → performance deterioration (McArdle, 2009).
Table 6. Reverse LCS Supplementary Analysis Results (Alternative causal ordering: ΔTP → ΔKH → Illegitimate Tasks).
Bayesian robustness checks in Table 7 corroborate the main findings: under diffuse priors the posterior means for the two focal indirect effects virtually duplicate the ML estimates—Unnecessary Tasks → ΔKH → ΔTP−0.128 vs.−0.128 and Unreasonable Tasks → ΔKH → ΔTP−0.119 vs.−0.119, both within 0.01—and the 95 % Bayesian credible intervals overlap 98–99 % of the ML confidence intervals, with one-tailed posterior p-values = 0.001 and Gelman-Rubin <1.01 for all parameters. Thus, whether viewed through frequentist or Bayesian lenses, the longitudinal pathway whereby illegitimate tasks elicit knowledge-hiding and thereby erode task performance remains identical, demonstrating high immunity to prior specification.
Table 7. Bayesian Robustness Check (Non-informative prior (N ~ 0, 103); 100,000 iterations, 3 chains).
As a final stress-test we conducted “extreme-value trimming” (Table 8): the 14 most aberrant cases (|Z| > 3.5) were deleted, reducing N from 250 to 236, and the model was re-estimated. The coefficients barely moved—both unnecessary- and unreasonable-task effects on ΔKH slipped by only 0.01-0.02, and the ΔKH → ΔTP path shifted by merely +0.02, all changes well below the conventional 0.05 sensitivity threshold. The indirect effects were equally stable: the UT and UnT mediated paths changed by only +0.011 and +0.010, respectively, with 95 % CIs still excluding zero and significance intact. Thus, neither the “illegitimate-tasks → knowledge-hiding → performance-decline” pathway nor its individual components are inflated by outliers; the core longitudinal mediation survives the 5 % trimming test and remains highly robust.
Discussion
Theoretical implications
First, illegitimate tasks function as episodic relational shocks that activate knowledge hiding within the same quarter. While cross-sectional research links illegitimate tasks to dissatisfaction (Pindek et al., 2018; Semmer et al., 2015), our LCSM reveals that within-person spikes in unnecessary tasks immediately heighten knowledge hiding (β = 0.30-0.32), which erodes next-quarter performance (indirect = −0.12 to−0.14). This corroborates social exchange theory's dynamic reciprocity principle—task legitimacy violations are repaid with intellectual withdrawal within quarterly cycles, offering a micro-foundation absent in static tests Cropanzano and Mitchell (2005).
Second, knowledge hiding operates as the primary behavioral channel through which illegitimate tasks degrade performance (Muntz et al., 2019). This cognitive resource withdrawal precedes affective exhaustion, as supported by our finding that hiding fully mediates the task-performance link while direct effects remain non-significant (Hobfoll, 1989). This refines COR theory by demonstrating that intellectual concealment is the first-line defense against contractual breach, with emotional depletion emerging only when hiding is constrained.
Thirdly, the indirect harm of unreasonable tasks equals that of unnecessary tasks, challenging prior attributional arguments that “unreasonable” is inherently more toxic than “unnecessary.” Using scenario experiments, Pindek et al. (2018) reported stronger immediate anger and greater injustice when tasks were framed as unreasonable rather than unnecessary, leading the authors to conclude that unreasonable tasks constitute the more severe stressor. Our Monte-Carlo confidence intervals, however, reveal statistically equivalent indirect effects on performance through hiding (-0.11 vs.−0.12) and nearly identical effect sizes for the unnecessary-task path (β = 0.30) and the unreasonable-task path (β = 0.28). This implies that any perceived contractual breach, regardless of semantic subtype, uniformly activates relational withdrawal once the within-person lens is adopted. Consequently, challenge–hindrance nomenclature should treat illegitimacy as a continuous violation construct rather than maintaining a categorical “unreasonable > unnecessary” hierarchy (Mihelič et al., 2024; Pindek et al., 2024; Podsakoff et al., 2007).
Fourthly, social exchange theory gains temporal granularity: a single episode of task illegitimacy is sufficient to trigger hiding that lowers objective performance in the subsequent quarter, satisfying the precedence principle for causal inference. Meta-analytic evidence has established between-person associations between cost events and knowledge hiding (Ding and Kuvaas, 2023), but it cannot determine which comes first within the same employee. Our reverse-order latent change score model shows no credible path from performance-change to hiding-change or from hiding-change to later illegitimacy, thereby ruling out reverse causation (Hamaker et al., 2015; McArdle, 2009). The within-person indirect effect (-0.12) thus represents genuine temporal mediation, demonstrating that momentary perceptions of contractual violation are repaid within the same quarter with intellectual withdrawal, which in turn erodes next-quarter performance scores (Hameed et al., 2023). This intra-individual reciprocity loop embeds social exchange principles inside weekly or quarterly cycles, a granularity that static or between-person designs could not capture (Cropanzano et al., 2017).
Lastly, methodologically, the study demonstrates that four-wave latent change score modeling paired with Monte-Carlo confidence intervals provides a template for testing intra-individual mediation without the autoregressive lag confounds that plague traditional cross-lagged panels (Liu and Perera, 2023). Previous longitudinal work on illegitimate tasks has relied heavily on cross-lagged panel analyses (e.g., Muntz et al., 2019) that partial out stable trait variance and assume equal intervals, often conflating between-person and within-person effects (Hamaker et al., 2015). By specifying true within-person change factors and bootstrapping 20,000 Monte-Carlo draws, we ensure that the indirect effect (-0.12) reflects same-person change over time rather than rank-order stability. The approach is immediately exportable to other micro-process questions—such as daily citizenship fluctuations or momentary creativity spirals—where constructs vary rapidly within persons and causal ordering is critical (Preacher and Selig, 2012). Consequently, the study offers a replicable methodological blueprint for moving work-design research from “who is disadvantaged” to “when and why each person becomes disadvantaged” (McArdle, 2009).
Practical implications
First, implement quarterly “task legitimacy audits” to catch unnecessary spikes before they cascade into knowledge concealment. By embedding a four-item illegitimacy scale (Semmer et al., 2010) in existing pulse surveys, HR can identify with in-person increases ≥1 SD and trigger a rapid redesign conversation with the employee's supervisor (Costantini et al., 2025; Fältén et al., 2025). Our LCS results show that every 0.30-unit rise in unnecessary tasks elevates hiding within the same quarter and erodes next-quarter performance by 0.12 standard deviations; thus, intercepting the spike at Wave-2 can prevent the downstream 4-6 % productivity loss typically observed in knowledge-work teams (Ding and Kuvaas, 2023). Audits should be paired with a “legitimacy log” where managers document the business rationale for each newly assigned task, creating a transparent trail that reduces perceived contractual violation and the subsequent need for intellectual withdrawal.
Second, equip supervisors with micro-restoration skills to repair exchange relationships in the same survey cycle, rather than waiting for annual climate interventions. Because hiding is activated momentarily after illegitimacy spikes, managers need same-week relational restoration tools such as interactive justice explanations (Colquitt et al., 2013) or 10 mins participative renegotiation sessions that allow employees to voice concerns and co-create task boundaries (Kostovicova and Vico, 2024). Training modules should include role-play simulations where leaders practice converting an “unnecessary report” into a joint analytic project, thereby preserving the employee's autonomy and identity (Humphrey et al., 2007). Evaluation studies show that a single interactive justice episode can reduce hiding intentions by 25 % within 5 days (Folger, 1997), offering an immediate behavioral antidote to the quarterly illegitimacy–hiding spiral uncovered in our model.
Third, embed knowledge-hiding triggers directly into task workflows to short-circuit the hiding reflex before it crystallizes. Since the performance damage travels exclusively through concealment, organizations can insert collaborative micro-requirements (e.g., mandatory “knowledge drop” comments in project software, peer-review checkpoints, or pair-programming slots) that make hiding procedurally harder than sharing (Corbo et al., 2023; Fait et al., 2022). Such behavioral nudges have been shown to increase daily knowledge contributions by 18 % in R&D teams (Zweig, 2012). Coupled with the audit data above, HR can time these triggers to coincide with the quarter following an illegitimacy spike, ensuring that the relational withdrawal impulse is redirected into visible contribution, thereby neutralizing the −0.12 indirect effect we observed.
Fourth, redesign job descriptions to eliminate optional low-value tasks rather than merely redistributing them, thereby attacking the root source of illegitimacy. Our finding that both unnecessary and unreasonable tasks produce equivalent indirect harm implies that any perceived contractual breach is toxic; thus, lean-tasking interventions should use objective value-scoring (customer impact × strategic alignment) to delete, automate, or outsource low-score activities. A quasi-experiment in a Fortune-500 IT division eliminated 12 % of unnecessary reports and saw knowledge hiding drop by 0.28 SD and project delivery speed rise by 7 % within 2 quarters (Humphrey et al., 2007). Cost-benefit dashboards can quantify the productivity dividend of deletion, giving senior leaders financial justification for investing in preventive job crafting rather than post-hoc stress-management programmers.
Fifth, institutionalize “legitimacy KPIs” for people-managers to ensure that prevention of illegitimate assignments is measured, monitored, and rewarded alongside traditional performance metrics. Because hiding is invisible to standard productivity dashboards, organizations should add “% high-value tasks” and “quarterly illegitimacy slope” to manager scorecards, creating accountability for relational climate at the same level as revenue or deadline targets. Balanced-scorecard field studies show that when relational KPIs are tied to bonuses, supervisors reduce low-utility assignments by 15 % and improve team knowledge-hiding climate by 0.32 SD within 6 months (Colquitt et al., 2013). Cascading these KPIs from division to individual managers ensures that the within-person illegitimacy–hiding spiral we documented is visible and actionable, converting our temporal mediation finding into a concrete management incentive that protects both employee wellbeing and organizational performance.
Limitations and future directions
We found near-identical effects for unnecessary and unreasonable tasks, contrary to predictions that controllability differences would yield distinct pathways. This suggests that within-person dynamics, the severity of resource threat may override semantic distinctions. Future research should experimentally manipulate task controllability to test whether boundary conditions exist at the event level that are obscured in our quarterly design.
Our use of supervisor-rated knowledge hiding warrants discussion. While self-reports avoid observational bias, they suffer from social desirability. Supervisor ratings, though potentially contaminated by halo effects, align with performance evaluations and capture organizationally visible behaviors. We acknowledge that this approach may reflect perceived rather than actual hiding. Future research should triangulate using peer nominations or digital trace data (e.g., reduced contributions to knowledge repositories) to validate our findings.
Our single-context Chinese sample may intensify knowledge hiding effects. High power-distance norms discourage open confrontation with illegitimate assignments, making concealment a low-risk retaliation strategy. While this enhances ecological validity for similar cultures, generalizability to low power-distance contexts (e.g., Nordic countries) requires testing. Multi-country replication is needed to unpack how cultural values moderate the illegitimacy-hiding link.
Data availability statement
The raw data supporting the conclusions of this article will be made available by the authors, without undue reservation.
Ethics statement
The studies involving humans were approved by Shandong Normal University Business School Ethics Committee. The studies were conducted in accordance with the local legislation and institutional requirements. The participants provided their written informed consent to participate in this study.
Author contributions
HZ: Data curation, Investigation, Writing – review & editing. XG: Data curation, Investigation, Writing – original draft, Writing – review & editing. DJ: Conceptualization, Data curation, Methodology, Writing – original draft. YL: Data curation, Investigation, Writing – review & editing.
Funding
The author(s) declared that financial support was not received for this work and/or its publication.
Conflict of interest
The author(s) declared that this work was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.
Generative AI statement
The author(s) declared that generative AI was not used in the creation of this manuscript.
Any alternative text (alt text) provided alongside figures in this article has been generated by Frontiers with the support of artificial intelligence and reasonable efforts have been made to ensure accuracy, including review by the authors wherever possible. If you identify any issues, please contact us.
Publisher's note
All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article, or claim that may be made by its manufacturer, is not guaranteed or endorsed by the publisher.
References
Brislin, R. W. (1980). “Translation and content analysis of oral and written materials,” in Handbook of Cross-Cultural Psychology: Methodology, eds. H. C. Triandis, and J. W. Berry (Boston, MA: Allyn and Bacon), 389–444.
Cavanaugh, M. A., Boswell, W. R., Roehling, M. V., and Boudreau, J. W. (2000). An empirical examination of self-reported work stress among U.S. managers. J. Appl. Psychol. 85, 65–74. doi: 10.1037/0021-9010.85.1.65
Chen, F. F. (2007). Sensitivity of goodness of fit indexes to lack of measurement invariance. Struct. Equ. Model. 14, 464–504. doi: 10.1080/10705510701301834
Colquitt, J., Scott, B., Rodell, J., Long, D., Zapata, C., Conlon, D., et al. (2013). Justice at the millennium, a decade later: a meta-analytic test of social exchange and affect-based perspectives. J. Appl. Psychol. 98, 199–236. doi: 10.1037/a0031757
Corbo, L., Kraus, S., Vlačić, B., et al. (2023). Coopetition and innovation: a review and research agenda. Technovation 122:102624. doi: 10.1016/j.technovation.2022.102624
Costantini, A., Vignoli, M., and Avanzi, L. (2025). Illegitimate tasks and demand crafting: how configurations of illegitimacy shape proactive coping at work. J. Bus. Psychol. 29:2025. doi: 10.1007/s10869-025-10080-1
Cropanzano, R., Anthony, E. L., Daniels, S. R., and Hall, A. V. (2017). Social exchange theory: a critical review with theoretical remedies. Acad. Manag. Ann. 11, 1–38. doi: 10.5465/annals.2015.0099
Cropanzano, R., and Mitchell, M. (2005). Social exchange theory: an interdisciplinary review. J. Manage. 31, 874–900. doi: 10.1177/0149206305279602
Ding, H., and Kuvaas, B. (2023). Illegitimate tasks: a systematic literature review and agenda for future research. Work Stress 37, 397–420. doi: 10.1080/02678373.2022.2148308
Durkheim, É., and Coser, L. A. (1998). The Division of Labour in Society (trans. WD Halls). 8. [print.]. Theoretical traditions in the social sciences. Basingstoke: Macmillan.
Eatough, E., Meier, L., Igic, I., et al. (2015). You want me to do what? Two daily diary studies of illegitimate tasks and employee wellbeing. J. Organ. Behav. 37:2032. doi: 10.1002/job.2032
Fait, M., Magni, D., Perano, M., Farina Briamonte, M., and Sasso, P. (2022). Grassroot processes of knowledge sharing to build social innovation capabilities. J. Knowl. Manag. 27, 1390–1408. doi: 10.1108/JKM-04-2022-0338
Fältén, R., Berntson, E., and Bernhard-Oettel, C. (2025). Illegitimate tasks in the public sector—associations with work engagement, stress, and turnover intention: the moderating role of leadership. Nord Psychol. 372–394. doi: 10.1080/19012276.2024.2444932
Folger, R. (1997). Retaliation in the workplace: the roles of distributive, procedural, and interactional justice. J. Appl. Psychol. 1:1997.
Gabriel, A. S., Diefendorff, J. M., and Grandey, A. A. (2023). The acceleration of emotional labor research: navigating the past and steering toward the future. Pers. Psychol. 76, 511–545. doi: 10.1111/peps.12576
Grant, A. M., and Ashford, S. J. (2008). The dynamics of proactivity at work. Res. Organ. Behav. 28, 3–34. doi: 10.1016/j.riob.2008.04.002
Grošelj, M., Černe, M., Penger, S., and Grah, B. (2020). Authentic and transformational leadership and innovative work behaviour: the moderating role of psychological empowerment. Eur. J. Innov. Manag. 24, 677–706. doi: 10.1108/ejim-10-2019-0294
Hamaker, E., Kuiper, R., and Grasman, R. (2015). A critique of the cross-lagged panel model. Psychol. Methods 20, 102–116. doi: 10.1037/a0038889
Hameed, I., Arain G, A., and Nicolau J, L. (2023). Leader knowledge hiding and employee change-oriented voice: a dual mediation process. Tour. Manag. 98:104781. doi: 10.1016/j.tourman.2023.104781
Hobfoll, S. E. (1989). Conservation of resources: a new attempt at conceptualizing stress. Am. Psychol.44, 513–524. doi: 10.1037/0003-066X.44.3.513
Humphrey, S. E., Nahrgang, J. D., and Morgeson, F. P. (2007). Integrating motivational, social, and contextual work design features: a meta-analytic summary and theoretical extension of the work design literature. J. Appl. Psychol. 92, 1332–1356. doi: 10.1037/0021-9010.92.5.1332
Jiang, F., Lu, S., Ji, L.-J., and Wang, H.-J. (2023). Culture and the way of granting job autonomy: goal or execution? J. Occup. Organ. Psychol. 96, 624–645. doi: 10.1111/joop.12438
Katz, I. M., Rudolph, C. W., Kuehner, C., and Zacher, H. (2023). Job characteristics and employee green behavior. J. Environ. Psychol. 92:102159. doi: 10.1016/j.jenvp.2023.102159
Koopman, J., Lanaj, K., and Scott B, A. (2016). Integrating the bright and dark sides of OCB: a daily investigation of the benefits and costs of helping others. Acad. Manag. J. 59, 414–435. doi: 10.5465/amj.2014.0262
Kostovicova, D., and Vico, S. (2024). Interactions for Justice: an introduction. J. Interv. Statebuild 18, 493–511. doi: 10.1080/17502977.2024.2437589
Kottwitz, M. U., Kälin, W., and Otto, K. (2025). Illegitimate tasks predict sleep disturbances and musculoskeletal pain: single and serial indirect effects of qualitative job insecurity and emotional exhaustion. Occup. Health Sci. 9, 711–742. doi: 10.1007/s41542-025-00227-0
Kruk, M., Pawlak, M., Taherian, T., and Yüce, E. (2023). When time matters: mechanisms of change in a mediational model of foreign language playfulness and L2 learners' emotions using latent change score mediation model. Stud. Second Lang. Learn. Teach.13, 39–69. doi: 10.14746/ssllt.37174
Kunzelmann, A., Rigotti, T., and Crane M, F. (2025). Latent profiles of challenge, hindrance, and threat appraisals on time pressure and job complexity: antecedents and outcomes. Aus. J. Manag. 50, 431–458. doi: 10.1177/03128962231222825
Låstad, L., Pienaar, J., Näswall, K., Richter, A., Hellgren, J., and Sverke, M. (2025). Moving on up now? A meta-analysis of the associations between job insecurity and career-related outcomes. Scand. J. Work Organ. Psychol. 10:2. doi: 10.16993/sjwop.275
Liu, J., and Perera, R. A. (2023). Assessing mediational processes using piecewise linear growth curve models with individual measurement occasions. Behav. Res. Methods 55, 3218–3240. doi: 10.3758/s13428-022-01940-2
McArdle, J. J. (2009). Latent variable modeling of differences and changes with longitudinal data. Annual Rev. Psychol. 60, 577–605. doi: 10.1146/annurev.psych.60.110707.163612
Mihelič, K. K., Zupan, N., and Merku, Ž A. (2024). I feel the need – the need for speed! Unreasonable tasks, work pace, psychological detachment and emotional exhaustion. J. Organ. Effect. People Perform. 11, 162–177. doi: 10.1108/JOEPP-07-2021-0185
Muntz, J., Dormann, C., and Kronenwett, M. (2019). Supervisors' relational transparency moderates effects among employees' illegitimate tasks and job dissatisfaction: a four-wave panel study. Eur. J. Work Organ. Psychol. 58, 1–13. doi: 10.1080/1359432X.2019.1625888
Oldham, G. R., and Hackman, J. R. (2010). Not what it was and not what it will be: the future of job design research. J. Organ. Behav. 31, 463–479. doi: 10.1002/job.678
Parker, S., Morgeson, F., and Johns, G. (2017). One hundred years of work design research: looking back and looking forward. J. Appl. Psychol. 102, 403–420. doi: 10.1037/apl0000106
Pham Thi, T. D., and Duong, N. T. (2024). Investigating learning burnout and academic performance among management students: a longitudinal study in English courses. BMC Psychol. 12:219. doi: 10.1186/s40359-024-01725-6
Pindek, S., Demircioglu Nayir, E., Howard, D., and Eatough, E. M. (2018). Illegitimate tasks are not created equal: examining the effects of attributions on unreasonable and unnecessary tasks. Work Stress 33, 1–16. doi: 10.1080/02678373.2018.1445672
Pindek, S., Meyer, K., Valvo, A., and Arvan, M. (2024). A dynamic view of the challenge-hindrance stressor framework: a meta-analysis of daily diary studies. J. Bus. Psychol. 39, 1107–1125. doi: 10.1007/s10869-024-09933-y
Pindek, S., Zhou, Z. E., Kessler, S. R., Krajcevska, A., and Spector, P. E. (2021). Workdays are not created equal: job satisfaction and job stressors across the workweek. Hum. Relat. 74, 1447–1472. doi: 10.1177/0018726720924444
Podsakoff, N. P., LePine, J. A., and LePine, M. A. (2007). Differential challenge stressor-hindrance stressor relationships with job attitudes, turnover intentions, turnover, and withdrawal behavior: a meta-analysis. J. Appl. Psychol. 92:438. doi: 10.1037/0021-9010.92.2.438
Preacher, K. J., and Selig, J. P. (2012). Advantages of monte carlo confidence intervals for indirect effects. Commun. Methods Meas. 6, 77–98. doi: 10.1080/19312458.2012.679848
Rhee, Y., and Choi, J. (2016). Knowledge management behavior and individual creativity: goal orientations as antecedents and in-group social status as moderating contingency: knowledge management behavior. J. Organ. Behav. 38:job2168. doi: 10.1002/job.2168
Rodell, J. B., and Judge, T. A. (2009). Can “good” stressors spark “bad” behaviors? The mediating role of emotions in links of challenge and hindrance stressors with citizenship and counterproductive behaviors. J. Appl. Psychol. 94, 1438–1451. doi: 10.1037/a0016752
Schilbach, M., Arnold, M., Baethge, A., and Rigotti, T. (2023). Hindrance demands as a boundary condition to the appraisal of challenge demands. Anxiety Stress Coping 36, 434–443. doi: 10.1080/10615806.2022.2108019
Semmer, N., Jacobshagen, N., Meier, L. M., Elfering, A., Beehr, T. A., Kälin, W., et al. (2015). Illegitimate tasks as a source of work stress. Work Stress 1, 32–56. doi: 10.1080/02678373.2014.1003996
Semmer, N. K., Tschan, F., Meier L, L., Facchin, S., and Jacobshagen, N. (2010). Illegitimate tasks and counterproductive work behavior. Appl. Psychol. 59, 70–96. doi: 10.1111/j.1464-0597.2009.00416.x
Tan, Z., Yuan, L., Wang, J., and Wan, Q. (2024). When the victims fight back: the influence of workplace ostracism on employee knowledge sabotage behavior. J. Knowl. Manag. 28, 1249–1277. doi: 10.1108/JKM-04-2023-0303
Tims, M., Bakker A, B., and Derks, D. (2015). Job crafting and job performance: a longitudinal study. Eur. J. Work Organ. Psychol. 24, 914–928. doi: 10.1080/1359432X.2014.969245
Van Dyne, L., and LePine, J. A. (1998). Helping and voice extra-role behaviors: evidence of construct and predictive validity. Acad. Manag. J. 41, 108–119. doi: 10.2307/256902
Wang, S., and Noe, R. (2010). Knowledge sharing: a review and directions for future research. Hum. Res. Manag. Rev. 20, 115–131. doi: 10.1016/j.hrmr.2009.10.001
Webster, J., Beehr, T., and Christiansen, N. (2010). Toward a better understanding of the effects of hindrance and challenge stressors on work behavior. J. Vocat. Behav. 76, 68–77. doi: 10.1016/j.jvb.2009.06.012
Yuan, S., and Yan, Y. (2024). Illegitimate tasks and knowledge hiding: the mediating role of psychological contract violation and moderating role of optimism. J. Manag. Psychol. 40, 37–51. doi: 10.1108/JMP-03-2023-0154
Keywords: challenge-hindrance theory, knowledge sharing knowledge hiding, latent change score modeling, performance, task, unnecessary tasks, unreasonable tasks
Citation: Zhu H, Gu X, Jiang D and Liu Y (2026) Illegitimate tasks, knowledge hiding, and performance erosion: a four-wave latent change score investigation. Front. Psychol. 16:1730215. doi: 10.3389/fpsyg.2025.1730215
Received: 30 October 2025; Revised: 12 December 2025;
Accepted: 24 December 2025; Published: 23 January 2026.
Edited by:
Jesus Juyumaya, Santo Tomás University, ChileReviewed by:
Vera Voitova, Santo Tomás University, ChileJuan Carlos Armijos, Santo Tomás University, Chile
Copyright © 2026 Zhu, Gu, Jiang and Liu. This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) and the copyright owner(s) are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.
*Correspondence: Daokui Jiang, amRrMjQwNTA0QDE2My5jb20=
†ORCID: Daokui Jiang orcid.org/0000-0002-2341-6127