<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD Journal Publishing DTD v2.3 20070202//EN" "journalpublishing.dtd">
<article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" article-type="research-article" dtd-version="2.3" xml:lang="EN">
<front>
<journal-meta>
<journal-id journal-id-type="publisher-id">Front. Psychol.</journal-id>
<journal-title>Frontiers in Psychology</journal-title>
<abbrev-journal-title abbrev-type="pubmed">Front. Psychol.</abbrev-journal-title>
<issn pub-type="epub">1664-1078</issn>
<publisher>
<publisher-name>Frontiers Media S.A.</publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id pub-id-type="doi">10.3389/fpsyg.2023.1279964</article-id>
<article-categories>
<subj-group subj-group-type="heading">
<subject>Psychology</subject>
<subj-group>
<subject>Original Research</subject>
</subj-group>
</subj-group>
</article-categories>
<title-group>
<article-title>Expanding the dimensions of knowledge hiding: testing a moderated mediation model and analyzing the mediating role of psychological distress using PLS-SEM</article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author"><name><surname>Jin</surname> <given-names>Xiu</given-names></name><xref rid="aff1" ref-type="aff"><sup>1</sup></xref>
<uri xlink:href="https://loop.frontiersin.org/people/1925724/overview"/>
<role content-type="https://credit.niso.org/contributor-roles/data-curation/"/>
<role content-type="https://credit.niso.org/contributor-roles/methodology/"/>
<role content-type="https://credit.niso.org/contributor-roles/writing-original-draft/"/>
</contrib>
<contrib contrib-type="author" corresp="yes"><name><surname>Jin</surname> <given-names>Shanyue</given-names></name><xref rid="aff1" ref-type="aff"><sup>1</sup></xref><xref ref-type="corresp" rid="c001">
<sup>&#x002A;</sup></xref>
<role content-type="https://credit.niso.org/contributor-roles/conceptualization/"/>
<role content-type="https://credit.niso.org/contributor-roles/formal-analysis/"/>
<role content-type="https://credit.niso.org/contributor-roles/writing-review-editing/"/>
</contrib>
<contrib contrib-type="author" corresp="yes"><name><surname>Qing</surname> <given-names>Chenglin</given-names></name><xref rid="aff2" ref-type="aff"><sup>2</sup></xref><xref ref-type="corresp" rid="c002">
<sup>&#x002A;</sup></xref>
<uri xlink:href="https://loop.frontiersin.org/people/1564307/overview"/>
<role content-type="https://credit.niso.org/contributor-roles/conceptualization/"/>
<role content-type="https://credit.niso.org/contributor-roles/writing-review-editing/"/>
</contrib>
</contrib-group>
<aff id="aff1"><sup>1</sup><institution>College of Business, Gachon University</institution>, <addr-line>Seongnam</addr-line>, <country>Republic of Korea</country></aff>
<aff id="aff2"><sup>2</sup><institution>Department of Business Administration, Honam University</institution>, <addr-line>Gwangju</addr-line>, <country>Republic of Korea</country></aff>
<author-notes>
<fn fn-type="edited-by" id="fn0001">
<p>Edited by: Radha R. Sharma, New Delhi Institute of Management, India</p>
</fn>
<fn fn-type="edited-by" id="fn0002">
<p>Reviewed by: Guanglei Zhang, Wuhan University of Technology, China; Erum Shaikh, Shaheed Benazir Bhutto University Shaheed Benazirabad, Pakistan</p>
</fn>
<corresp id="c001">&#x002A;Correspondence: Shanyue Jin, <email>jsyrena0923@gachon.ac.kr</email></corresp>
<corresp id="c002">Chenglin Qing, <email>2013129@honam.ac.kr</email></corresp>
</author-notes>
<pub-date pub-type="epub">
<day>27</day>
<month>11</month>
<year>2023</year>
</pub-date>
<pub-date pub-type="collection">
<year>2023</year>
</pub-date>
<volume>14</volume>
<elocation-id>1279964</elocation-id>
<history>
<date date-type="received">
<day>21</day>
<month>08</month>
<year>2023</year>
</date>
<date date-type="accepted">
<day>16</day>
<month>10</month>
<year>2023</year>
</date>
</history>
<permissions>
<copyright-statement>Copyright &#x00A9; 2023 Jin, Jin and Qing.</copyright-statement>
<copyright-year>2023</copyright-year>
<copyright-holder>Jin, Jin and Qing</copyright-holder>
<license xlink:href="http://creativecommons.org/licenses/by/4.0/">
<p>This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) and the copyright owner(s) are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.</p>
</license>
</permissions>
<abstract>
<p>This study sheds light on the literature on knowledge-hiding behavior in organizations and highlights a better and deeper understanding of the reasons for giving rise to knowledge hiding. In recent decades, knowledge hiding has been subjected to numerous studies in systematic literature reviews and organizational management regarding its impact on outcomes such as individual and organizational performance; however, the mechanism by which knowledge hiding is influenced by antecedents and the process of leading knowledge hiding has not been actively verified. In addition, most previous studies have classified knowledge hiding into one-factor or three-factor dimensions: evasive hiding, playing dumb, and rationalized hiding. To address these issues and limitations, we aimed to conduct empirical research, which have focused on four new dimensions (playing dumb, evasive hiding, rationalized hiding, and procrastination) of knowledge-hiding behavior. Unlike previous research, we provide a research framework for the process of hiding knowledge and verify the significance of the research model, drawing on the social exchange theory and conservation of resources theory to explore and verify the process of hiding knowledge. Specifically, we argue that knowledge hiding is caused by exploitative leadership, and psychological distress as mediators in the relationship between these two variables. Moreover, the moderating and mediating effects of leader incivility were verified. To empirically test the research model, a survey was conducted with 287 employees from small- and medium-sized enterprises in China. Partial least squares structural equation modeling (PLS-SEM), SPSS PROCESS, and AMOS software were used for statistical analyzes. The findings provide evidence that exploitative leadership positively influences both psychological distress and the four dimensions of knowledge hiding. In addition, the mediating effect of psychological distress and the moderating effect of leader incivility were verified and shown to be statistically significant. Based on these findings, the theoretical and practical implications, limitations, and directions for future research are discussed. Overall, the most important contribution is expanding the research field, as this is the first empirical study on the four dimensions of knowledge hiding.</p>
</abstract>
<kwd-group>
<kwd>exploitative leadership</kwd>
<kwd>psychological distress</kwd>
<kwd>leader&#x2019;s incivility</kwd>
<kwd>knowledge hiding</kwd>
<kwd>moderated mediation model</kwd>
<kwd>partial least squares structural equation modeling</kwd>
</kwd-group>
<counts>
<fig-count count="2"/>
<table-count count="10"/>
<equation-count count="0"/>
<ref-count count="116"/>
<page-count count="20"/>
<word-count count="15346"/>
</counts>
<custom-meta-wrap>
<custom-meta>
<meta-name>section-at-acceptance</meta-name>
<meta-value>Organizational Psychology</meta-value>
</custom-meta>
</custom-meta-wrap>
</article-meta>
</front>
<body>
<sec sec-type="intro" id="sec1">
<label>1</label>
<title>Introduction</title>
<p>The global business environment has recently become more knowledge-oriented and technology-intensive (<xref ref-type="bibr" rid="ref50">Jones and Ratten, 2020</xref>; <xref ref-type="bibr" rid="ref43">Jafari-Sadeghi et al., 2021</xref>, <xref ref-type="bibr" rid="ref44">2022</xref>). Business growth usually occurs when knowledge-based organizations combine data, information, and knowledge (<xref ref-type="bibr" rid="ref19">Davis and Botkin, 1994</xref>). In particular, the importance of the knowledge possessed by organizational members for organizational development and the role of utilizing knowledge have been emphasized. Based on the role of knowledge in facilitating organizational growth, organizations have been demanding that organizational members share their knowledge with colleagues. Organizational members&#x2019; knowledge sharing is regarded as an engine that promotes organizational growth, economic growth, and business flourishing (<xref ref-type="bibr" rid="ref55">Khoreva and Wechtler, 2020</xref>). Most previous studies have demonstrated the role of knowledge sharing and verified the relationship between knowledge sharing and individual and organizational performance (<xref ref-type="bibr" rid="ref59">Li et al., 2020</xref>; <xref ref-type="bibr" rid="ref89">Singh et al., 2021</xref>; <xref ref-type="bibr" rid="ref76">Olan et al., 2022</xref>; <xref ref-type="bibr" rid="ref114">Yue et al., 2022</xref>; <xref ref-type="bibr" rid="ref47">Jia et al., 2023</xref>).</p>
<p>Although the extant literature has focused on organizational members&#x2019; knowledge-sharing and its driving factors, little research has focused on factors that inhibit individuals&#x2019; knowledge-sharing behavior and facilitate them to hide their knowledge (<xref ref-type="bibr" rid="ref31">Ghani et al., 2020</xref>). Furthermore, few studies have explored knowledge hiding in a culturally diverse workforce (<xref ref-type="bibr" rid="ref7">Babic et al., 2018</xref>; <xref ref-type="bibr" rid="ref68">Miminoshvili and &#x010C;erne, 2022</xref>). Unlike the lack of research exploring the process behind knowledge hiding, studies have been conducted on the negative effects of knowledge hiding. For example, previous research has suggested that knowledge hiding is negatively related to innovative work behavior (<xref ref-type="bibr" rid="ref72">Mubarak et al., 2022</xref>) and task performance (<xref ref-type="bibr" rid="ref88">Singh, 2019</xref>). Furthermore, a higher level of knowledge hiding prevents organizational members from delivering creative input, indicating that it is negatively associated with employee creativity (<xref ref-type="bibr" rid="ref45">Jahanzeb et al., 2019</xref>). These statements suggest that a greater and deeper understanding of both the reason for and the process underlying knowledge hiding in diverse workplaces is urgently needed.</p>
<p>Leadership is a significant antecedent variable that can give rise to knowledge hiding in small- and medium-sized enterprises (SMEs) (<xref ref-type="bibr" rid="ref109">Xu et al., 2022</xref>). We argue that knowledge hiding is related to exploitative leadership. Exploitative leadership is a destructive leadership pattern (<xref ref-type="bibr" rid="ref1">Abdulmuhsin et al., 2021</xref>) that utilizes subordinates solely to the leader&#x2019;s own interests (<xref ref-type="bibr" rid="ref27">Feng et al., 2022</xref>), and such a style of leadership can be considered egoist (<xref ref-type="bibr" rid="ref103">Wu et al., 2021</xref>). The characteristics of an exploitative leader are that such leaders are selfish and seek to gain personal benefit by exploiting their subordinates, which impacts employees&#x2019; knowledge-hiding behavior (<xref ref-type="bibr" rid="ref79">Peng et al., 2019</xref>; <xref ref-type="bibr" rid="ref1">Abdulmuhsin et al., 2021</xref>).</p>
<p>Based on the above, this study aimed to identify the causal relationship between exploitative leadership and knowledge hiding. Moreover, we verified the role of exploitative leadership and its effects on knowledge hiding and predicted that exploitative leadership would lead to knowledge hiding through psychological distress. <xref ref-type="bibr" rid="ref85">Rubbab et al. (2022)</xref> suggested that an organizational member&#x2019;s psychological distress plays the role of an explanatory mechanism in the relationship between organizational dehumanization and knowledge hiding. Specifically, dehumanization consumes the psychological resources of organizational members and acts as a stressor by causing psychological distress. This process leads organizational members to use defensive tactics to recover resources or stop their resource loss cycle. Eventually, organizational members&#x2019; defensive techniques take the form of knowledge-hiding behavior (<xref ref-type="bibr" rid="ref85">Rubbab et al., 2022</xref>). We predict that psychological distress is expected to have a mediating role in the effect of exploitative leadership on knowledge hiding. In particular, previous studies have emphasized the mediating effect of psychological distress as the main cause of knowledge hiding. For example, <xref ref-type="bibr" rid="ref9">Bhatti et al. (2023)</xref> have demonstrated the significant mediating role of psychological distress in the relationship between organizational ostracism and knowledge hiding. Additionally, <xref ref-type="bibr" rid="ref85">Rubbab et al. (2022)</xref> verified the significant mediating effect of psychological distress in the relationship between organizational dehumanization and knowledge hiding. In particular, the main reasons selecting small and medium-sized enterprises is more suitable for this research are as follows. The concept of exploitative leadership is a newly emerged leadership style. Most studies of exploitative leadership thus far have focused on hospitals (<xref ref-type="bibr" rid="ref66">Majeed and Fatima, 2020</xref>), hotels (<xref ref-type="bibr" rid="ref113">Ye et al., 2022</xref>), logistics companies (<xref ref-type="bibr" rid="ref63">Lyu et al., 2023</xref>), and the education sector (<xref ref-type="bibr" rid="ref3">Akhtar et al., 2022</xref>).</p>
<p>The characteristic of organizational dehumanization is a type of organizational mistreatment through showing little respect and interest in employees and treating them as a tool to achieve organizational goals (<xref ref-type="bibr" rid="ref85">Rubbab et al., 2022</xref>). Importantly, there are similar aspects between the characteristics of exploitative leadership and dehumanization. In particular, an exploitative leader is egoistic, inherently self-serving, exerts pressure, manipulates, and treats subordinates as a tool to achieve their own goals (<xref ref-type="bibr" rid="ref3">Akhtar et al., 2022</xref>; <xref ref-type="bibr" rid="ref8">Basaad et al., 2023</xref>). Hence, exploitative leadership leads to psychological distress and psychological distress mediates the relationship between exploitative leadership and knowledge hiding (<xref ref-type="bibr" rid="ref34">Guo et al., 2021</xref>). Therefore, psychological distress occurs as a mediation in the relationship between exploitative leadership and knowledge hiding. Likewise, exploitative leadership possesses dehumanizing characteristics, such as manipulating and exerting pressure on subordinates, acting egoistically, hindering development, consistently working under challenging conditions, overburdening subordinates, and taking credit for subordinates&#x2019; achievements (<xref ref-type="bibr" rid="ref86">Schmid et al., 2019</xref>; <xref ref-type="bibr" rid="ref103">Wu et al., 2021</xref>).</p>
<p>Therefore, we investigated subordinates&#x2019; knowledge-hiding behavior as an outcome of exploitative leadership through psychological distress. To increase the strength of the influence of exploitative leadership on psychological distress, we examined the moderating effect of leader incivility. We also tested the moderated mediating effect of leader incivility on the mediating effect of psychological distress on the relationship between exploitative leadership and knowledge hiding.</p>
<p>To address these issues, we present the purpose of the current research and its multiple contributions to the literature. First, most previous studies have classified knowledge hiding into a one-factor dimension (<xref ref-type="bibr" rid="ref45">Jahanzeb et al., 2019</xref>; <xref ref-type="bibr" rid="ref70">Moh&#x2019;d et al., 2021</xref>; <xref ref-type="bibr" rid="ref42">Islam et al., 2022</xref>; <xref ref-type="bibr" rid="ref57">Koay and Lim, 2022</xref>; <xref ref-type="bibr" rid="ref108">Xu and Xue, 2023</xref>) or three-factor dimensions, namely, evasive hiding, playing dumb, and rationalized hiding (<xref ref-type="bibr" rid="ref2">Akhlaghimofrad and Farmanesh, 2021</xref>; <xref ref-type="bibr" rid="ref100">Wang et al., 2023</xref>; <xref ref-type="bibr" rid="ref107">Xu et al., 2023</xref>). <xref ref-type="bibr" rid="ref25">Farooq and Sultana (2021)</xref> suggest that knowledge hiding can be divided into four dimensions: playing dumb, evasive hiding, rationalized hiding, and procrastination. However, no empirical studies have been conducted on these four dimensions. To address these limitations and suggestions, we broaden the existing literature on the dimensions related to knowledge hiding. To the best of our knowledge, this is the first empirical study to focus on these four dimensions of knowledge-hiding behavior.</p>
<p>Second, most studies on knowledge hiding have demonstrated its influence on individual and organizational performance (e.g., <xref ref-type="bibr" rid="ref45">Jahanzeb et al., 2019</xref>; <xref ref-type="bibr" rid="ref88">Singh, 2019</xref>; <xref ref-type="bibr" rid="ref72">Mubarak et al., 2022</xref>). Unlike in previous studies, we provide a research model related to the process underlying knowledge hiding, and then verify it.</p>
<p>Third, exploitative leadership is a newly emerging concept and there is little research on exploitative leadership and its effects on knowledge hiding from employees. This can be seen as a gap in the logical aspect of how exploitative leadership causes knowledge hiding. To fill these gaps, this study aims to explain the relationship via social exchange theory and conservation of resource theory. Furthermore, knowledge hiding generally consists of three subdimensions, However, we consider that other factors may exist. Thus, this study explores another dimension more broadly. This can reduce the gap with previous research.</p>
<p>Finally, the main reasons for selecting small and medium-sized enterprises as more suitable for this research are as follows. The concept of exploitative leadership is a newly emerged leadership style. Most of the exploitative leadership research focused on hospitals (<xref ref-type="bibr" rid="ref66">Majeed and Fatima, 2020</xref>), hotels (<xref ref-type="bibr" rid="ref113">Ye et al., 2022</xref>), logistics companies (<xref ref-type="bibr" rid="ref63">Lyu et al., 2023</xref>), and the education sector (<xref ref-type="bibr" rid="ref3">Akhtar et al., 2022</xref>). The representative characteristics of exploitative leadership are selfishness, exploiting members to achieve goals, and regarding members as a tool to achieve the leader&#x2019;s personal goals. In particular, small and medium-sized businesses are characterized by an emphasis on competition and performance orientation. Nevertheless, there is as yet little previous research on exploitative leadership in small and medium-sized enterprises. Therefore, it will be worth revealing the level and influence of exploitative leadership in small and medium-sized businesses.</p>
<p>In addition, most studies have focused on students (<xref ref-type="bibr" rid="ref115">Zhai et al., 2020</xref>), professors (<xref ref-type="bibr" rid="ref20">Demirkasimoglu, 2016</xref>), and universities (<xref ref-type="bibr" rid="ref110">Yang and Ribiere, 2020</xref>) to test knowledge hiding. In addition to educational institutions, leveraging knowledge to maintain or gain a competitive advantage in SMEs is particularly important (<xref ref-type="bibr" rid="ref50">Jones and Ratten, 2020</xref>; <xref ref-type="bibr" rid="ref44">Jafari-Sadeghi et al., 2022</xref>). However, research targeting small and medium-sized enterprises is insufficient. In particular, small and medium-sized businesses are demanding higher levels of performance from their employees to ensure competitiveness and sustainability. In this situation, employees&#x2019; knowledge plays a fundamental prerequisite for the survival and development of SMEs in the knowledge economy era (<xref ref-type="bibr" rid="ref44">Jafari-Sadeghi et al., 2022</xref>; <xref ref-type="bibr" rid="ref109">Xu et al., 2022</xref>). This explains that the importance of knowledge is not only emphasized in educational institutions, but also in small and medium-sized businesses. Nevertheless, employees in SMEs with higher performance anticipations were more likely to be motivated via differential leadership to advance their personal recognition of occupation insecurity and it may then increase employees&#x2019; knowledge hiding (<xref ref-type="bibr" rid="ref109">Xu et al., 2022</xref>). According to these issues, the hiding of knowledge or information related to tasks among SEMs has increased rapidly. Thus, we focus on SME employees to expand the diversity of the sample and identify the main pathways shaping knowledge hiding.</p>
</sec>
<sec id="sec2">
<label>2</label>
<title>Theoretical background and hypotheses development</title>
<sec id="sec3">
<label>2.1</label>
<title>Exploitative leadership and knowledge hiding</title>
<p>Knowledge is one of the most important resources for allowing employees and organizations to achieve success (<xref ref-type="bibr" rid="ref80">Pereira and Mohiya, 2021</xref>). Hence, organizations encourage their employees to share their knowledge to strengthen organizational competitiveness through creative ideas. However, deliberately hiding knowledge may negatively influence individual and organizational outcomes such as employees&#x2019; creativity and organizational innovation.</p>
<p>Most previous studies have divided knowledge hiding into three factors or dimensions (<xref ref-type="bibr" rid="ref2">Akhlaghimofrad and Farmanesh, 2021</xref>; <xref ref-type="bibr" rid="ref100">Wang et al., 2023</xref>; <xref ref-type="bibr" rid="ref107">Xu et al., 2023</xref>). Specifically, the three dimensions of knowledge hiding have been described by <xref ref-type="bibr" rid="ref16">Connelly et al. (2012)</xref> as: playing dumb (i.e., pretending not to know the requested knowledge of interest), rationalized hiding (i.e., the knowledge owner offers some reasons for not providing knowledge), and evasive hiding (i.e., the knowledge hider provides incomplete or wrong information for knowledge seekers). In addition to these three-factor dimensions of knowledge hiding, <xref ref-type="bibr" rid="ref25">Farooq and Sultana (2021)</xref> added procrastination for the first time.</p>
<p>The four dimensions of knowledge hiding are summarized as follows. Playing dumbs is defined as pretending not to understand something while requesting specific knowledge or information (<xref ref-type="bibr" rid="ref4">Ali et al., 2021</xref>). Evasive hiding refers to sharing incorrect information when individuals request it (<xref ref-type="bibr" rid="ref37">Hameed et al., 2023</xref>). Rationalized hiding is defined as justifying knowledge seekers for failing to offer assistance to a solution. Procrastination refers to a style of behavior that intentionally delays the knowledge requested by a knowledge seeker without explicitly denying it (<xref ref-type="bibr" rid="ref25">Farooq and Sultana, 2021</xref>).</p>
<p>Knowledge hiding can occur in various ways. In particular, there is playing-dumb behavior in which a person pretends not to understand another person&#x2019;s requests and conceals knowledge in a situation where knowledge is generally known. Evasive hiding is the act of intentionally conveying incorrect information to avoid conveying knowledge. Furthermore, rationalized hiding is the act that justifies the knowledge seeker&#x2019;s failure to provide knowledge. In addition to these three types of knowledge-hiding behaviors, another hiding behavior includes the act of deliberately delaying the information of a person requesting knowledge, which is regarded as procrastination. We believe that procrastination, as presented by <xref ref-type="bibr" rid="ref25">Farooq and Sultana (2021)</xref>, is also a type of knowledge hiding. We argue that the conservation of resource theory and social exchange theory may support the underlying linkage between exploitative leadership and knowledge hiding.</p>
<p>Exploitative leadership is the promotion of a leader&#x2019;s personal self-interest through the exploitation of others (<xref ref-type="bibr" rid="ref1">Abdulmuhsin et al., 2021</xref>). This includes selfish behavioral traits. In addition, leaders&#x2019; selfish behavior can impact employees&#x2019; knowledge-hiding behavior (<xref ref-type="bibr" rid="ref79">Peng et al., 2019</xref>). The reason leadership causes knowledge hiding is to be explained through the conservation of resources theory.</p>
<p>Conservation of resources theory proposes that when individuals are threatened with a potential loss of resources, they respond to such situation by trying to protect their own remaining resources which they possess (<xref ref-type="bibr" rid="ref38">Hobfoll, 1989</xref>; <xref ref-type="bibr" rid="ref11">Byrne et al., 2014</xref>; <xref ref-type="bibr" rid="ref90">&#x0160;kerlavaj et al., 2018</xref>). The underlying principle of the conservation of resource theory suggests individuals strive to protect, retain, and foster the resources that they value (<xref ref-type="bibr" rid="ref39">Hobfoll, 2001</xref>; <xref ref-type="bibr" rid="ref101">Westman et al., 2004</xref>; <xref ref-type="bibr" rid="ref3">Akhtar et al., 2022</xref>). Employees are susceptible and likely to protect their numerous valued resources ranging from physical resources to energy, and from personal to condition-based (<xref ref-type="bibr" rid="ref38">Hobfoll, 1989</xref>, <xref ref-type="bibr" rid="ref39">2001</xref>).</p>
<p>Furthermore, normally an individual attempts to protect their own valuable resources from further losses when someone encounters threatening situations. Moreover, an exploitative leader can be viewed as a form of workplace stress for subordinates such that they engage in protecting their valued resources (<xref ref-type="bibr" rid="ref38">Hobfoll, 1989</xref>; <xref ref-type="bibr" rid="ref3">Akhtar et al., 2022</xref>). In addition, it is highly likely that an exploitative leadership style will ultimately lead employees to perceive incivility. The reason is that awareness of workplace incivility drains individuals motivational mental state for work, after which cognitive effort to preserve their resources and avoid the further loss of personal resource results in subordinates&#x2019; knowledge hiding (<xref ref-type="bibr" rid="ref23">Escart&#x00ED;n et al., 2011</xref>; <xref ref-type="bibr" rid="ref64">Magee et al., 2017</xref>; <xref ref-type="bibr" rid="ref74">Obeidat et al., 2018</xref>).</p>
<p>In particular, exploitative leaders are a serious menace to their subordinates and take credit for certain of their achievements even if the leader has not contributed to them (<xref ref-type="bibr" rid="ref86">Schmid et al., 2019</xref>). In addition, the exploitative leader uses personal influence and manipulative behavior against their subordinates for their own benefit. Furthermore, exploitative leadership may evoke a kind of moral justification process that facilitates increased subordinate organizational and interpersonal deviance (<xref ref-type="bibr" rid="ref63">Lyu et al., 2023</xref>). These statements highlight that if subordinates&#x2019; resources such as knowledge or information are threatened by their leader, it will be a strong possibility that subordinates will hide their knowledge to protect their knowledge.</p>
<p>In another aspect, social exchange theory explains how exploitative leadership causes knowledge hiding. Social exchange theory presents that social exchange derives from informal relationships and such exchange creates individual feelings of obligation and trust (<xref ref-type="bibr" rid="ref10">Blau, 1964</xref>; <xref ref-type="bibr" rid="ref78">Peng et al., 2014</xref>; <xref ref-type="bibr" rid="ref27">Feng et al., 2022</xref>). In addition, social exchange theory suggests norms of reciprocity that positive norms of reciprocity promote individuals to return positive treatment they receive according to the exchange of positive treatment. On the contrary, the negative norms of reciprocity promote individuals to return negative treatment according to the exchange of negative treatment (<xref ref-type="bibr" rid="ref33">Gouldner, 1960</xref>; <xref ref-type="bibr" rid="ref18">Cropanzano and Mitchell, 2005</xref>; <xref ref-type="bibr" rid="ref27">Feng et al., 2022</xref>). In particular, social exchange theory emphasizes that individuals are willing to share their own information with coworkers as they may expect something of significant worth in return, and owing to such a process are likely to share knowledge in response (<xref ref-type="bibr" rid="ref105">Xiao and Cooke, 2019</xref>; <xref ref-type="bibr" rid="ref21">Dodokh, 2020</xref>). Good relationships promote developing shared trust and respect, which leads employees to utilize constructive exchange for supporting information exchange with one another (<xref ref-type="bibr" rid="ref116">Zhao et al., 2016</xref>). However, exploitative leaders persistently breach reciprocity norms that usually produce positive supervisor-subordinate exchange. Responding to this negative exchange, subordinates feel obliged to react to such unfair treatment from their leader (<xref ref-type="bibr" rid="ref71">Moin et al., 2022</xref>). Furthermore, the poor connection is bound to trigger negative correspondence in response to past disagreeable encounters and builds a likelihood of knowledge-hiding behavior (<xref ref-type="bibr" rid="ref116">Zhao et al., 2016</xref>; <xref ref-type="bibr" rid="ref21">Dodokh, 2020</xref>).</p>
<p>In addition, social exchange theory posits that when exploited, subordinates exhibit counterproductive knowledge behavior such as knowledge hiding and direct it toward coworkers, those coworkers show similar counterproductive knowledge behavior of hiding their knowledge (<xref ref-type="bibr" rid="ref27">Feng et al., 2022</xref>). Therefore, exploitative leadership possesses strong negative aspects that can result in knowledge hiding owing to creating a poor level of trust by establishing a low level of exchange relationship with subordinates.</p>
<p>Moreover, sustained exposure to leaders&#x2019; exploitation leads organizational members to perceive a form of resource that loses personal autonomy and concerns job control because exploitative leaders give both tedious and boring tasks, place inappropriately high job demands, and exert excessive work pressure on employees (<xref ref-type="bibr" rid="ref87">Schmid et al., 2018</xref>). According to the reasoning behind the cognitive theory related to stress coping and appraisal, employees&#x2019; primary appraisal of the process becomes active when they face exploitative leadership, and this process makes them likely to withhold their own knowledge and increase knowledge hiding (<xref ref-type="bibr" rid="ref93">Syed et al., 2019</xref>). In addition, if leaders show subordinates that personal interest is more important than mutual interests, subordinates citing this is regarded as institutionalized behavior in the organization and preference their personal interests when asking for knowledge and declining to respond appropriately (<xref ref-type="bibr" rid="ref79">Peng et al., 2019</xref>; <xref ref-type="bibr" rid="ref58">Labafi et al., 2022</xref>). Furthermore, exploitative leadership can contribute to an increase in the stress level of subordinates, ultimately leading to increased levels of knowledge hiding (<xref ref-type="bibr" rid="ref93">Syed et al., 2019</xref>). Therefore, exploited subordinates are reluctant to devote their time and energy to other organizational members&#x2019; requests and engage in knowledge hiding (<xref ref-type="bibr" rid="ref34">Guo et al., 2021</xref>).</p>
<disp-quote>
<p><italic>H1</italic>: Exploitative leadership has a positive influence on knowledge hiding.</p>
</disp-quote>
<disp-quote>
<p><italic>H1-1</italic>: Exploitative leadership has a positive influence on playing dumb.</p>
</disp-quote>
<disp-quote>
<p><italic>H1-2</italic>: Exploitative leadership has a positive influence on evasive hiding.</p>
</disp-quote>
<disp-quote>
<p><italic>H1-3</italic>: Exploitative leadership has a positive influence on rationalized hiding.</p>
</disp-quote>
<disp-quote>
<p><italic>H1-4</italic>: Exploitative leadership has a positive influence on procrastination.</p>
</disp-quote>
</sec>
<sec id="sec4">
<label>2.2</label>
<title>The mediating role of psychological distress</title>
<p>When leaders indulge in manipulative and exploitative tactics, such as pressurizing, underchallenging, and overburdening subordinates, those subordinates experience psychological stress (<xref ref-type="bibr" rid="ref38">Hobfoll, 1989</xref>). Exploitative leadership may create a stressful situation in the workplace that causes subordinates to feel a loss of their potential resources, which may lead to psychological distress and facilitate workplace incivility (<xref ref-type="bibr" rid="ref56">Kiyani et al., 2021</xref>). Furthermore, exploitation increases organizational members&#x2019; psychological strain and undermines their well-being (<xref ref-type="bibr" rid="ref62">Livne-Ofer et al., 2019</xref>; <xref ref-type="bibr" rid="ref86">Schmid et al., 2019</xref>; <xref ref-type="bibr" rid="ref34">Guo et al., 2021</xref>). When subordinates experience and recognize their leaders&#x2019; intimidating behavior, this may drain their cognitive resources, increasing their level of psychological distress (<xref ref-type="bibr" rid="ref67">Mawritz et al., 2014</xref>; <xref ref-type="bibr" rid="ref40">Hobfoll et al., 2018</xref>). Eventually, exploitative leadership aggravates organizational members&#x2019; emotional complexity, which may result in greater psychological distress (<xref ref-type="bibr" rid="ref26">Fatima and Majeed, 2023</xref>; <xref ref-type="bibr" rid="ref52">Karatepe et al., 2023</xref>). In summary, exploitative leadership exploits subordinates, causing them to experience workplace stress and jeopardizing their psychological well-being. The negative role of exploitative leadership is expected to eventually cause psychological distress in subordinates.</p>
<p>Thus, we draw on the proposition that psychological distress encourages knowledge hiding. Organizational members engage in knowledge hiding to downplay psychological distress and rationalize the ill-treatment of dehumanization (<xref ref-type="bibr" rid="ref84">Robinson et al., 2004</xref>). Additionally, they may feel that their organizations treat them as robots and care less for their interests, which may create psychological strain and stress (<xref ref-type="bibr" rid="ref84">Robinson et al., 2004</xref>; <xref ref-type="bibr" rid="ref32">Glicken and Robinson, 2013</xref>). Psychological distress is the main cause of organizational dehumanization. In the context of an individual&#x2019;s knowledge requests, knowledge-hiding behaviors may function as a defensive means to address psychological distress. The high level of psychological distress explains why organizational members possess more aversive psychological reactions, including anxiety and tension, which lead to a lack of physical and emotional resources (<xref ref-type="bibr" rid="ref29">Garcia et al., 2017</xref>, <xref ref-type="bibr" rid="ref28">2018</xref>; <xref ref-type="bibr" rid="ref77">Park et al., 2018</xref>; <xref ref-type="bibr" rid="ref34">Guo et al., 2021</xref>). In addition, when facing emotional exhaustion and psychological distress, organizational members consider self-protection behaviors, such as knowledge hiding (<xref ref-type="bibr" rid="ref112">Yao et al., 2020</xref>; <xref ref-type="bibr" rid="ref54">Khelladi et al., 2022</xref>).</p>
<p>According to the conservation of resources theory, if people face a loss of resources or experience worry, they will experience psychological strain, facilitate preservation, and try to protect their limited resources (<xref ref-type="bibr" rid="ref38">Hobfoll, 1989</xref>; <xref ref-type="bibr" rid="ref40">Hobfoll et al., 2018</xref>; <xref ref-type="bibr" rid="ref56">Kiyani et al., 2021</xref>). Therefore, exploitative leaders who create a non-constructive atmosphere by abusing organizational members&#x2019; efforts may contribute to a destructive atmosphere with psychological distress and anxiety, and lead to subordinates hiding their information and knowledge to confront them (<xref ref-type="bibr" rid="ref30">Ghanbari and Majooni, 2022</xref>). Specifically, workplace bullying can consume lots of employees&#x2019; emotional resources leading to psychological distress, after which individuals will form rational cognition and re-examine whether their efforts are worthwhile. Eventually, they will adopt some self-protection behaviors (such as knowledge hiding) to avoid further loss of resources (<xref ref-type="bibr" rid="ref24">Escartin et al., 2011</xref>; <xref ref-type="bibr" rid="ref64">Magee et al., 2017</xref>; <xref ref-type="bibr" rid="ref74">Obeidat et al., 2018</xref>; <xref ref-type="bibr" rid="ref112">Yao et al., 2020</xref>). Subordinates tend to develop negative mental states that may create psychological distress when their leaders engage in exploitative behaviors. Working under exploitative leadership is not easy, and subordinates are manipulated, overburdened, and pressured (<xref ref-type="bibr" rid="ref56">Kiyani et al., 2021</xref>).</p>
<p>In sum, exploitative leadership acts as a work stressor that leads to emotional complexity, which depletes employees&#x2019; resources. This loss of resources can cause psychological distress (<xref ref-type="bibr" rid="ref26">Fatima and Majeed, 2023</xref>). Thus, subordinates find it difficult to gain more resources in adverse psychological distress situations; consequently, they hide their knowledge to gain a competitive edge in their workplaces (<xref ref-type="bibr" rid="ref46">Javid et al., 2023</xref>). These findings suggest that exploitative leadership causes subordinates to hide their knowledge through psychological distress. Given these arguments, we propose that psychological distress mediates the relationship between exploitative leadership and knowledge hiding.</p>
<disp-quote>
<p><italic>H2</italic>: Psychological distress mediates the relationship between exploitative leadership and playing dumb.</p>
</disp-quote>
<disp-quote>
<p><italic>H3</italic>: Psychological distress mediates the relationship between exploitative leadership and evasive hiding.</p>
</disp-quote>
<disp-quote>
<p><italic>H4</italic>: Psychological distress mediates the relationship between exploitative leadership and rationalized hiding.</p>
</disp-quote>
<disp-quote>
<p><italic>H5</italic>: Psychological distress mediates the relationship between exploitative leadership and procrastination.</p>
</disp-quote>
</sec>
<sec id="sec5">
<label>2.3</label>
<title>The moderated mediation role of the leader&#x2019;s incivility</title>
<p>We predicted that subordinates&#x2019; psychological distress would be moderated by the interaction between exploitative leadership and leader incivility. The main cause is that leaders&#x2019; incivility violates workplace norms. When a leader behaves rudely toward subordinates, the escalation of negative behavior creates a high level of conflict (<xref ref-type="bibr" rid="ref95">Torkelson et al., 2016</xref>). In addition, leader incivility triggers retaliatory responses from subordinates and leads to behaviors that limit employees&#x2019; efforts and commitment to the organization (<xref ref-type="bibr" rid="ref94">Thompson et al., 2018</xref>). In particular, in SMEs, the level of leader incivility is relatively high and, consequently, subordinates&#x2019; psychological distress increases as they become dissatisfied with all aspects of the job and consider turnover more frequently (<xref ref-type="bibr" rid="ref17">Cortina et al., 2001</xref>).</p>
<p>In addition, leaders&#x2019; incivility may lead to social exclusion and injustice and, in the process, negatively impact subordinates&#x2019; psychological and physical well-being, eventually leading to negative psychological distress (<xref ref-type="bibr" rid="ref12">Caza and Cortina, 2007</xref>). This finding highlights the positive association between leader incivility and psychological distress. Therefore, the more insults and mental bullying the subordinate experiences, the higher their level of psychological distress.</p>
<p>The levels of subordinates&#x2019; psychological distress will vary depending on the extent to which they experience leader incivility and exploitative leadership. In particular, a leader&#x2019;s exploitation negatively impacts the work environment within the organization, gives rise to psychological pain, such as dissatisfaction or depression, and aggravates the leader&#x2019;s incivility. To achieve their own goals, exploitative leaders pressure employees and choose rude behavior and other methods to intimidate their subordinates, which reduces subordinates&#x2019; sense of belonging and leads to a loss of internal resources (<xref ref-type="bibr" rid="ref56">Kiyani et al., 2021</xref>). In addition, exploitative leaders exploit and oppress subordinates for their own benefit, and pursue their own goals by choosing exploitative behavior to achieve more profit (<xref ref-type="bibr" rid="ref75">Ogbonnaya et al., 2016</xref>).</p>
<p>Thus, the higher the leader&#x2019;s incivility, the stronger the effect of exploitative leadership on psychological distress. Furthermore, subordinates consume more resources owing to psychological distress and are more likely to experience higher levels of negative mental well-being, which leads them to adopt knowledge-hiding behaviors to prevent further resource loss (<xref ref-type="bibr" rid="ref34">Guo et al., 2021</xref>).</p>
<p>Psychological distress was used as a parameter in this study. We hypothesized that the stronger the interaction between exploitative leadership and leaders&#x2019; incivility, the higher the psychological distress of subordinates would be. This emphasizes that the mediating effect of psychological distress on the relationship between exploitative leadership and knowledge hiding is positively moderated by leader incivility.</p>
<disp-quote>
<p><italic>H6</italic>: Leader incivility positively moderates the relationship between exploitative leadership and psychological distress.</p>
</disp-quote>
<disp-quote>
<p><italic>H7</italic>: Leader incivility moderates the mediating effect of psychological distress on the relationship between exploitative leadership and playing dumb.</p>
</disp-quote>
<disp-quote>
<p><italic>H8</italic>: Leader incivility moderates the mediating effect of psychological distress on the relationship between exploitative leadership and evasive hiding.</p>
</disp-quote>
<disp-quote>
<p><italic>H9</italic>: Leader incivility moderates the mediating effect of psychological distress on the relationship between exploitative leadership and rationalized hiding.</p>
</disp-quote>
<disp-quote>
<p><italic>H10</italic>: Leader incivility moderates the mediating effect of psychological distress on the relationship between exploitative leadership and procrastination.</p>
</disp-quote>
</sec>
</sec>
<sec id="sec6">
<label>3</label>
<title>Research methodology</title>
<sec id="sec7">
<label>3.1</label>
<title>Respondents&#x2019; demographics and procedure</title>
<p>To verify our research model, we examined full-time employees in China. The data were collected from Chinese SMEs. All participants were instructed to refer to their most recent or current employment experience. From the 300 distributed surveys, 300 responses were received (100% response rate), and 287 data points were used for the empirical analysis. Thirteen data points were judged to lack honesty or integrity and were removed. In addition, we secured the validity of the participants&#x2019; work experience at their companies by targeting general employees who had worked in their organizations for more than 6&#x2009;months.</p>
<p>Descriptive statistics for the characteristics of the sample are as follows. The sample comprised 216 men (75.3%) and 71 women (24.7%). The majority of respondents were between 20 and 29&#x2009;years of age (53.0%). In contrast, the lowest proportion of respondents were over 50&#x2009;years (5.2%). In relation to service years, 57 (19.9%) respondents had been working in their companies for less than 1&#x2009;year, 105 (36.6%) had been working for 1&#x2013;4&#x2009;years, 40 (13.9%) had been working for 5&#x2013;6&#x2009;years, and 85 (29.6%) had been working there for 7 or more years.</p>
</sec>
<sec id="sec8">
<label>3.2</label>
<title>Measurements and main variable</title>
<p>To ensure that the Chinese surveys accurately reflected the original measurement in English, all questionnaires were back-translated into Chinese. Three people confirmed the accuracy of all measurements, and one bilingual author translated all measurements into Chinese. Next, the other two additional translated Chinese versions of the measurements were returned to English to verify the accuracy of the Chinese instruments.</p>
<p>Exploitative leadership was assessed using <xref ref-type="bibr" rid="ref86">Schmid&#x2019;s et al. (2019)</xref> method. Sample items include &#x201C;My leader takes it for granted that my work can be used for his or her personal benefit&#x201D; and &#x201C;My leader puts me under pressure to reach his or her personal goals.&#x201D; Respondents were asked about their degree of exploitative leadership and responses were measured on a 7-point scale, ranging from 1 (strongly disagree) to 7 (strongly agree). The Cronbach&#x2019;s alpha score was 0.937.</p>
<p>Psychological distress is defined as emotional disturbances that are usually caused by an internal or external stressor and often result in conflict that is unresolved (<xref ref-type="bibr" rid="ref5">Amjad et al., 2020</xref>). We measured psychological distress using a 10-item instrument developed by <xref ref-type="bibr" rid="ref53">Kessler et al. (2002)</xref>. Sample items include &#x201C;I feel so nervous that nothing could calm me down&#x201D; and &#x201C;I feel restless or fidgety.&#x201D; Respondents&#x2019; psychological distress was measured on a 7-point scale ranging from 1 (strongly disagree) to 7 (strongly agree). Cronbach&#x2019;s alpha for this study was 0.959.</p>
<p>A leader&#x2019;s incivility refers to abusive, insulting behavior; repeated, unfair sanctions; and intimidating, offensive, or abuse of power that makes subordinates feel humiliated, upset, vulnerable, or threatened, creating stress and undermining their self-confidence (<xref ref-type="bibr" rid="ref96">Vessey et al., 2010</xref>). To measure supervisors&#x2019; incivility, we asked participants to score honestly based on their experience of the leader&#x2019;s incivility using a 10-item instrument developed by <xref ref-type="bibr" rid="ref17">Cortina et al. (2001)</xref>. Sample items include &#x201C;My supervisor paid little attention to my statement or showed little interest in my opinion&#x201D; and &#x201C;My supervisor made demeaning or derogatory remarks about me.&#x201D; We used a Likert 7-point scale ranging from 1 (strongly disagree) to 7 (strongly agree) to measure all items. The Cronbach&#x2019;s alpha score was 0.951.</p>
<p>Knowledge hiding is defined as an organizational member&#x2019;s intention to retain or hide his/her knowledge when other members demand knowledge (<xref ref-type="bibr" rid="ref111">Yang et al., 2021</xref>). Knowledge hiding was measured by dividing it into four sub-dimensions: playing dumb, evasive hiding, rationalized hiding, and procrastination. To achieve this, participants were asked to rate their degree of knowledge hiding (playing dumb, evasive hiding, rationalized hiding, and procrastination) behavior on a 7-point Likert scale ranging from 1 (strongly disagree) to 7 (strongly agree). Participants were asked to truthfully provide their actual experiences.</p>
<p><xref ref-type="bibr" rid="ref16">Connelly et al. (2012)</xref> divided knowledge hiding into three dimensions: playing dumb, evasive hiding, and rationalized hiding.</p>
<p>Playing dumb is a behavior that ignites or pretends not to know what the knowledge seeker is asking about (<xref ref-type="bibr" rid="ref16">Connelly et al., 2012</xref>). The four-item scale for measuring playing dumb was adapted from <xref ref-type="bibr" rid="ref2">Akhlaghimofrad and Farmanesh (2021)</xref>. Sample items include &#x201C;I pretended that I did not know the information&#x201D; and &#x201C;I said that I was not very knowledgeable about the topic.&#x201D; The Cronbach&#x2019;s alpha score was 0.937.</p>
<p>Evasive hiding refers to providing knowledge seekers with incomplete knowledge or promising knowledge seekers with an absolute answer in the future with no intention of providing knowledge (<xref ref-type="bibr" rid="ref16">Connelly et al., 2012</xref>). We used an instrument developed by <xref ref-type="bibr" rid="ref2">Akhlaghimofrad and Farmanesh (2021)</xref> and a four-item scale to measure evasive hiding. Sample items include &#x201C;I agreed to help him/her but never really intended to&#x201D; and &#x201C;I told him/her that I would help him/her later but stalled as much as possible.&#x201D; The Cronbach&#x2019;s alpha score was 0.959.</p>
<p>Rationalized hiding is defined as offering justification to organizational members who are knowledge seekers for failing to provide assistance for solutions to problems or questions (<xref ref-type="bibr" rid="ref25">Farooq and Sultana, 2021</xref>). Rationalized hiding refers to justifying hiding one&#x2019;s knowledge by giving reasons (<xref ref-type="bibr" rid="ref16">Connelly et al., 2012</xref>). The four-item scale for measuring rationalized hiding was adapted from <xref ref-type="bibr" rid="ref2">Akhlaghimofrad and Farmanesh (2021)</xref>. Sample items include &#x201C;I explained that the information is confidential and only available to people on a particular project&#x201D; and &#x201C;I told him/her that my boss would not let anyone share this knowledge.&#x201D; The Cronbach&#x2019;s alpha score in this study was 0.884.</p>
<p>Finally, procrastination refers to a style of behavior that intentionally delays the knowledge requested by another member who is a knowledge seeker. It refers to the act of deliberately delaying the knowledge requested by another member without explicitly denying it (<xref ref-type="bibr" rid="ref25">Farooq and Sultana, 2021</xref>). In order to measure procrastination, of the total 12 items , we used 11 items after thoroughly grasping their overall content. In addition, the content of <xref ref-type="bibr" rid="ref91">Steel&#x2019;s (2010)</xref> items was delayed in decision-making. Based on this, the survey was conducted after modifying the content to intentionally delay the time and hide knowledge. Sample items included &#x201C;I am continually saying &#x2018;I&#x2019;ll share knowledge with them the next time&#x2019;&#x201D; and &#x201C;In order to avoid sharing knowledge, I often waste time by doing other things.&#x201D; The Cronbach&#x2019;s alpha score was 0.955. <xref ref-type="fig" rid="fig1">Figure 1</xref> illustrates the research model.</p>
<fig position="float" id="fig1">
<label>Figure 1</label>
<caption>
<p>The research model.</p>
</caption>
<graphic xlink:href="fpsyg-14-1279964-g001.tif"/>
</fig>
</sec>
</sec>
<sec id="sec9">
<label>4</label>
<title>Data analysis</title>
<sec id="sec10">
<label>4.1</label>
<title>Exploratory factor analysis</title>
<p>The results of exploratory factor analysis (EFA) showed that all factor loadings were above 0.50 (with a range of 0.504&#x2013;0.876). Specifically, psychological distress was loaded as Factor 1, procrastination as Factor 2, leader&#x2019;s incivility as Factor 3, exploitative leadership as Factor 4, rationalized hiding as Factor 5, evasive hiding as Factor 6, and playing dumb as Factor 7. If the value of the loading factor is above 0.4, it is considered significant (<xref ref-type="bibr" rid="ref14">Comrey and Lee, 1992</xref>). Furthermore, the result of the Kaiser-Meyer-Olkin (KMO) was 0.945, and Bartlett&#x2019;s test of sphericity was significant (<italic>p</italic>&#x2009;&#x003C;&#x2009;0.001). The results revealed that the factor loadings effectively represented the factors. <xref ref-type="table" rid="tab1">Table 1</xref> shows the results of EFA.</p>
<table-wrap position="float" id="tab1">
<label>Table 1</label>
<caption>
<p>Exploratory factor analysis.</p>
</caption>
<table frame="hsides" rules="groups">
<thead>
<tr>
<th align="left" valign="top" rowspan="2">Variable</th>
<th align="center" valign="top" rowspan="2">Item</th>
<th align="center" valign="top" colspan="7">Components</th>
</tr>
<tr>
<th align="center" valign="top">1</th>
<th align="center" valign="top">2</th>
<th align="center" valign="top">3</th>
<th align="center" valign="top">4</th>
<th align="center" valign="top">5</th>
<th align="center" valign="top">6</th>
<th align="center" valign="top">7</th>
</tr>
</thead>
<tbody>
<tr>
<td align="left" valign="middle" rowspan="5">Exploitative leadership (A)</td>
<td align="center" valign="top">A1</td>
<td align="char" valign="middle" char=".">0.092</td>
<td align="char" valign="middle" char=".">0.111</td>
<td align="char" valign="middle" char=".">0.135</td>
<td align="char" valign="middle" char=".">0.791</td>
<td align="char" valign="middle" char=".">0.040</td>
<td align="char" valign="middle" char=".">0.065</td>
<td align="char" valign="middle" char=".">0.186</td>
</tr>
<tr>
<td align="center" valign="top">A2</td>
<td align="char" valign="middle" char=".">0.097</td>
<td align="char" valign="middle" char=".">0.072</td>
<td align="char" valign="middle" char=".">0.152</td>
<td align="char" valign="middle" char=".">0.876</td>
<td align="char" valign="middle" char=".">0.130</td>
<td align="char" valign="middle" char=".">0.061</td>
<td align="char" valign="middle" char=".">0.004</td>
</tr>
<tr>
<td align="center" valign="top">A3</td>
<td align="char" valign="middle" char=".">0.133</td>
<td align="char" valign="middle" char=".">0.114</td>
<td align="char" valign="middle" char=".">0.156</td>
<td align="char" valign="middle" char=".">0.875</td>
<td align="char" valign="middle" char=".">0.065</td>
<td align="char" valign="middle" char=".">0.050</td>
<td align="char" valign="middle" char=".">0.150</td>
</tr>
<tr>
<td align="center" valign="top">A4</td>
<td align="char" valign="middle" char=".">0.147</td>
<td align="char" valign="middle" char=".">0.092</td>
<td align="char" valign="middle" char=".">0.206</td>
<td align="char" valign="middle" char=".">0.854</td>
<td align="char" valign="middle" char=".">0.026</td>
<td align="char" valign="middle" char=".">0.145</td>
<td align="char" valign="middle" char=".">0.055</td>
</tr>
<tr>
<td align="center" valign="top">A5</td>
<td align="char" valign="middle" char=".">0.211</td>
<td align="char" valign="middle" char=".">0.136</td>
<td align="char" valign="middle" char=".">0.221</td>
<td align="char" valign="middle" char=".">0.853</td>
<td align="char" valign="middle" char=".">0.064</td>
<td align="char" valign="middle" char=".">0.050</td>
<td align="char" valign="middle" char=".">&#x2212;0.022</td>
</tr>
<tr>
<td align="left" valign="middle" rowspan="10">Psychological distress (B)</td>
<td align="center" valign="top">B1</td>
<td align="char" valign="middle" char=".">0.797</td>
<td align="char" valign="middle" char=".">0.206</td>
<td align="char" valign="middle" char=".">0.112</td>
<td align="char" valign="middle" char=".">0.052</td>
<td align="char" valign="middle" char=".">0.088</td>
<td align="char" valign="middle" char=".">0.055</td>
<td align="char" valign="middle" char=".">0.224</td>
</tr>
<tr>
<td align="center" valign="top">B2</td>
<td align="char" valign="middle" char=".">0.838</td>
<td align="char" valign="middle" char=".">0.217</td>
<td align="char" valign="middle" char=".">0.142</td>
<td align="char" valign="middle" char=".">0.166</td>
<td align="char" valign="middle" char=".">0.067</td>
<td align="char" valign="middle" char=".">0.063</td>
<td align="char" valign="middle" char=".">0.074</td>
</tr>
<tr>
<td align="center" valign="top">B3</td>
<td align="char" valign="middle" char=".">0.815</td>
<td align="char" valign="middle" char=".">0.145</td>
<td align="char" valign="middle" char=".">0.235</td>
<td align="char" valign="middle" char=".">0.165</td>
<td align="char" valign="middle" char=".">0.012</td>
<td align="char" valign="middle" char=".">0.185</td>
<td align="char" valign="middle" char=".">&#x2212;0.004</td>
</tr>
<tr>
<td align="center" valign="top">B4</td>
<td align="char" valign="middle" char=".">0.833</td>
<td align="char" valign="middle" char=".">0.178</td>
<td align="char" valign="middle" char=".">0.158</td>
<td align="char" valign="middle" char=".">0.078</td>
<td align="char" valign="middle" char=".">0.054</td>
<td align="char" valign="middle" char=".">0.011</td>
<td align="char" valign="middle" char=".">0.128</td>
</tr>
<tr>
<td align="center" valign="top">B5</td>
<td align="char" valign="middle" char=".">0.853</td>
<td align="char" valign="middle" char=".">0.185</td>
<td align="char" valign="middle" char=".">0.160</td>
<td align="char" valign="middle" char=".">0.057</td>
<td align="char" valign="middle" char=".">0.086</td>
<td align="char" valign="middle" char=".">0.133</td>
<td align="char" valign="middle" char=".">&#x2212;0.014</td>
</tr>
<tr>
<td align="center" valign="top">B6</td>
<td align="char" valign="middle" char=".">0.759</td>
<td align="char" valign="middle" char=".">0.163</td>
<td align="char" valign="middle" char=".">0.072</td>
<td align="char" valign="middle" char=".">0.097</td>
<td align="char" valign="middle" char=".">0.144</td>
<td align="char" valign="middle" char=".">&#x2212;0.019</td>
<td align="char" valign="middle" char=".">0.257</td>
</tr>
<tr>
<td align="center" valign="top">B7</td>
<td align="char" valign="middle" char=".">0.787</td>
<td align="char" valign="middle" char=".">0.226</td>
<td align="char" valign="middle" char=".">0.138</td>
<td align="char" valign="middle" char=".">0.117</td>
<td align="char" valign="middle" char=".">0.082</td>
<td align="char" valign="middle" char=".">0.082</td>
<td align="char" valign="middle" char=".">0.127</td>
</tr>
<tr>
<td align="center" valign="top">B8</td>
<td align="char" valign="middle" char=".">0.707</td>
<td align="char" valign="middle" char=".">0.227</td>
<td align="char" valign="middle" char=".">0.194</td>
<td align="char" valign="middle" char=".">0.104</td>
<td align="char" valign="middle" char=".">&#x2212;0.028</td>
<td align="char" valign="middle" char=".">0.183</td>
<td align="char" valign="middle" char=".">&#x2212;0.005</td>
</tr>
<tr>
<td align="center" valign="top">B9</td>
<td align="char" valign="middle" char=".">0.784</td>
<td align="char" valign="middle" char=".">0.252</td>
<td align="char" valign="middle" char=".">0.140</td>
<td align="char" valign="middle" char=".">0.082</td>
<td align="char" valign="middle" char=".">0.148</td>
<td align="char" valign="middle" char=".">0.134</td>
<td align="char" valign="middle" char=".">0.057</td>
</tr>
<tr>
<td align="center" valign="top">B10</td>
<td align="char" valign="middle" char=".">0.759</td>
<td align="char" valign="middle" char=".">0.210</td>
<td align="char" valign="middle" char=".">0.182</td>
<td align="char" valign="middle" char=".">0.130</td>
<td align="char" valign="middle" char=".">0.150</td>
<td align="char" valign="middle" char=".">0.212</td>
<td align="char" valign="middle" char=".">0.031</td>
</tr>
<tr>
<td align="left" valign="middle" rowspan="4">Playing dumb (C)</td>
<td align="center" valign="top">C1</td>
<td align="char" valign="middle" char=".">0.205</td>
<td align="char" valign="middle" char=".">0.302</td>
<td align="char" valign="middle" char=".">0.206</td>
<td align="char" valign="middle" char=".">0.143</td>
<td align="char" valign="middle" char=".">0.295</td>
<td align="char" valign="middle" char=".">0.144</td>
<td align="char" valign="middle" char=".">0.745</td>
</tr>
<tr>
<td align="center" valign="top">C2</td>
<td align="char" valign="middle" char=".">0.151</td>
<td align="char" valign="middle" char=".">0.303</td>
<td align="char" valign="middle" char=".">0.256</td>
<td align="char" valign="middle" char=".">0.176</td>
<td align="char" valign="middle" char=".">0.248</td>
<td align="char" valign="middle" char=".">0.175</td>
<td align="char" valign="middle" char=".">0.746</td>
</tr>
<tr>
<td align="center" valign="top">C3</td>
<td align="char" valign="middle" char=".">0.156</td>
<td align="char" valign="middle" char=".">0.278</td>
<td align="char" valign="middle" char=".">0.204</td>
<td align="char" valign="middle" char=".">0.102</td>
<td align="char" valign="middle" char=".">0.238</td>
<td align="char" valign="middle" char=".">0.248</td>
<td align="char" valign="middle" char=".">0.773</td>
</tr>
<tr>
<td align="center" valign="top">C4</td>
<td align="char" valign="middle" char=".">0.194</td>
<td align="char" valign="middle" char=".">0.289</td>
<td align="char" valign="middle" char=".">0.224</td>
<td align="char" valign="middle" char=".">0.096</td>
<td align="char" valign="middle" char=".">0.340</td>
<td align="char" valign="middle" char=".">0.159</td>
<td align="char" valign="middle" char=".">0.716</td>
</tr>
<tr>
<td align="left" valign="middle" rowspan="4">Evasive hiding (D)</td>
<td align="center" valign="top">D1</td>
<td align="char" valign="middle" char=".">0.200</td>
<td align="char" valign="middle" char=".">0.297</td>
<td align="char" valign="middle" char=".">0.262</td>
<td align="char" valign="middle" char=".">0.102</td>
<td align="char" valign="middle" char=".">0.212</td>
<td align="char" valign="middle" char=".">0.691</td>
<td align="char" valign="middle" char=".">0.313</td>
</tr>
<tr>
<td align="center" valign="top">D2</td>
<td align="char" valign="middle" char=".">0.230</td>
<td align="char" valign="middle" char=".">0.339</td>
<td align="char" valign="middle" char=".">0.268</td>
<td align="char" valign="middle" char=".">0.139</td>
<td align="char" valign="middle" char=".">0.158</td>
<td align="char" valign="middle" char=".">0.746</td>
<td align="char" valign="middle" char=".">0.216</td>
</tr>
<tr>
<td align="center" valign="top">D3</td>
<td align="char" valign="middle" char=".">0.199</td>
<td align="char" valign="middle" char=".">0.363</td>
<td align="char" valign="middle" char=".">0.260</td>
<td align="char" valign="middle" char=".">0.149</td>
<td align="char" valign="middle" char=".">0.173</td>
<td align="char" valign="middle" char=".">0.741</td>
<td align="char" valign="middle" char=".">0.198</td>
</tr>
<tr>
<td align="center" valign="top">D4</td>
<td align="char" valign="middle" char=".">0.210</td>
<td align="char" valign="middle" char=".">0.313</td>
<td align="char" valign="middle" char=".">0.283</td>
<td align="char" valign="middle" char=".">0.120</td>
<td align="char" valign="middle" char=".">0.171</td>
<td align="char" valign="middle" char=".">0.780</td>
<td align="char" valign="middle" char=".">0.178</td>
</tr>
<tr>
<td align="left" valign="middle" rowspan="4">Rationalized hiding (E)</td>
<td align="center" valign="top">E1</td>
<td align="char" valign="middle" char=".">0.140</td>
<td align="char" valign="middle" char=".">0.122</td>
<td align="char" valign="middle" char=".">0.077</td>
<td align="char" valign="middle" char=".">0.098</td>
<td align="char" valign="middle" char=".">0.840</td>
<td align="char" valign="middle" char=".">0.047</td>
<td align="char" valign="middle" char=".">0.238</td>
</tr>
<tr>
<td align="center" valign="top">E2</td>
<td align="char" valign="middle" char=".">0.054</td>
<td align="char" valign="middle" char=".">0.107</td>
<td align="char" valign="middle" char=".">0.064</td>
<td align="char" valign="middle" char=".">0.070</td>
<td align="char" valign="middle" char=".">0.871</td>
<td align="char" valign="middle" char=".">0.038</td>
<td align="char" valign="middle" char=".">0.246</td>
</tr>
<tr>
<td align="center" valign="top">E3</td>
<td align="char" valign="middle" char=".">0.077</td>
<td align="char" valign="middle" char=".">0.196</td>
<td align="char" valign="middle" char=".">0.093</td>
<td align="char" valign="middle" char=".">0.052</td>
<td align="char" valign="middle" char=".">0.815</td>
<td align="char" valign="middle" char=".">0.142</td>
<td align="char" valign="middle" char=".">0.204</td>
</tr>
<tr>
<td align="center" valign="top">E4</td>
<td align="char" valign="middle" char=".">0.183</td>
<td align="char" valign="middle" char=".">0.191</td>
<td align="char" valign="middle" char=".">0.123</td>
<td align="char" valign="middle" char=".">0.107</td>
<td align="char" valign="middle" char=".">0.614</td>
<td align="char" valign="middle" char=".">0.319</td>
<td align="char" valign="middle" char=".">0.007</td>
</tr>
<tr>
<td align="left" valign="middle" rowspan="7">Leader&#x2019;s incivility (F)</td>
<td align="center" valign="top">F1</td>
<td align="char" valign="middle" char=".">0.322</td>
<td align="char" valign="middle" char=".">0.246</td>
<td align="char" valign="middle" char=".">0.712</td>
<td align="char" valign="middle" char=".">0.321</td>
<td align="char" valign="middle" char=".">0.104</td>
<td align="char" valign="middle" char=".">0.112</td>
<td align="char" valign="middle" char=".">0.276</td>
</tr>
<tr>
<td align="center" valign="top">F2</td>
<td align="char" valign="middle" char=".">0.292</td>
<td align="char" valign="middle" char=".">0.248</td>
<td align="char" valign="middle" char=".">0.698</td>
<td align="char" valign="middle" char=".">0.309</td>
<td align="char" valign="middle" char=".">0.108</td>
<td align="char" valign="middle" char=".">0.112</td>
<td align="char" valign="middle" char=".">0.263</td>
</tr>
<tr>
<td align="center" valign="top">F3</td>
<td align="char" valign="middle" char=".">0.332</td>
<td align="char" valign="middle" char=".">0.259</td>
<td align="char" valign="middle" char=".">0.731</td>
<td align="char" valign="middle" char=".">0.296</td>
<td align="char" valign="middle" char=".">&#x2212;0.008</td>
<td align="char" valign="middle" char=".">0.217</td>
<td align="char" valign="middle" char=".">0.152</td>
</tr>
<tr>
<td align="center" valign="top">F4</td>
<td align="char" valign="top" char=".">0.295</td>
<td align="char" valign="top" char=".">0.310</td>
<td align="char" valign="top" char=".">0.728</td>
<td align="char" valign="top" char=".">0.253</td>
<td align="char" valign="top" char=".">0.067</td>
<td align="char" valign="top" char=".">0.290</td>
<td align="char" valign="top" char=".">0.052</td>
</tr>
<tr>
<td align="center" valign="top">F5</td>
<td align="char" valign="top" char=".">0.247</td>
<td align="char" valign="top" char=".">0.255</td>
<td align="char" valign="top" char=".">0.744</td>
<td align="char" valign="top" char=".">0.235</td>
<td align="char" valign="top" char=".">0.148</td>
<td align="char" valign="top" char=".">0.233</td>
<td align="char" valign="top" char=".">0.087</td>
</tr>
<tr>
<td align="center" valign="top">F6</td>
<td align="char" valign="top" char=".">0.265</td>
<td align="char" valign="top" char=".">0.303</td>
<td align="char" valign="top" char=".">0.723</td>
<td align="char" valign="top" char=".">0.274</td>
<td align="char" valign="top" char=".">0.041</td>
<td align="char" valign="top" char=".">0.237</td>
<td align="char" valign="top" char=".">0.159</td>
</tr>
<tr>
<td align="center" valign="top">F7</td>
<td align="char" valign="top" char=".">0.156</td>
<td align="char" valign="top" char=".">0.080</td>
<td align="char" valign="top" char=".">0.604</td>
<td align="char" valign="top" char=".">0.053</td>
<td align="char" valign="top" char=".">0.378</td>
<td align="char" valign="top" char=".">0.128</td>
<td align="char" valign="top" char=".">0.222</td>
</tr>
<tr>
<td align="left" valign="top" rowspan="11">Procrastination (G)</td>
<td align="center" valign="top">G1</td>
<td align="char" valign="top" char=".">0.278</td>
<td align="char" valign="top" char=".">0.735</td>
<td align="char" valign="top" char=".">0.071</td>
<td align="char" valign="top" char=".">0.133</td>
<td align="char" valign="top" char=".">0.052</td>
<td align="char" valign="top" char=".">0.224</td>
<td align="char" valign="top" char=".">0.236</td>
</tr>
<tr>
<td align="center" valign="top">G2</td>
<td align="char" valign="top" char=".">0.265</td>
<td align="char" valign="top" char=".">0.775</td>
<td align="char" valign="top" char=".">0.073</td>
<td align="char" valign="top" char=".">0.121</td>
<td align="char" valign="top" char=".">0.077</td>
<td align="char" valign="top" char=".">0.194</td>
<td align="char" valign="top" char=".">0.216</td>
</tr>
<tr>
<td align="center" valign="top">G3</td>
<td align="char" valign="top" char=".">0.285</td>
<td align="char" valign="top" char=".">0.797</td>
<td align="char" valign="top" char=".">0.102</td>
<td align="char" valign="top" char=".">0.125</td>
<td align="char" valign="top" char=".">0.101</td>
<td align="char" valign="top" char=".">0.114</td>
<td align="char" valign="top" char=".">0.238</td>
</tr>
<tr>
<td align="center" valign="top">G4</td>
<td align="char" valign="top" char=".">0.320</td>
<td align="char" valign="top" char=".">0.789</td>
<td align="char" valign="top" char=".">0.162</td>
<td align="char" valign="top" char=".">0.123</td>
<td align="char" valign="top" char=".">0.054</td>
<td align="char" valign="top" char=".">0.114</td>
<td align="char" valign="top" char=".">0.217</td>
</tr>
<tr>
<td align="center" valign="top">G5</td>
<td align="char" valign="top" char=".">0.215</td>
<td align="char" valign="top" char=".">0.806</td>
<td align="char" valign="top" char=".">0.172</td>
<td align="char" valign="top" char=".">0.127</td>
<td align="char" valign="top" char=".">0.104</td>
<td align="char" valign="top" char=".">0.212</td>
<td align="char" valign="top" char=".">0.149</td>
</tr>
<tr>
<td align="center" valign="top">G6</td>
<td align="char" valign="top" char=".">0.189</td>
<td align="char" valign="top" char=".">0.798</td>
<td align="char" valign="top" char=".">0.181</td>
<td align="char" valign="top" char=".">0.095</td>
<td align="char" valign="top" char=".">0.160</td>
<td align="char" valign="top" char=".">0.086</td>
<td align="char" valign="top" char=".">0.154</td>
</tr>
<tr>
<td align="center" valign="top">G7</td>
<td align="char" valign="top" char=".">0.166</td>
<td align="char" valign="top" char=".">0.830</td>
<td align="char" valign="top" char=".">0.187</td>
<td align="char" valign="top" char=".">0.037</td>
<td align="char" valign="top" char=".">0.060</td>
<td align="char" valign="top" char=".">0.029</td>
<td align="char" valign="top" char=".">0.165</td>
</tr>
<tr>
<td align="center" valign="top">G8</td>
<td align="char" valign="top" char=".">0.216</td>
<td align="char" valign="top" char=".">0.831</td>
<td align="char" valign="top" char=".">0.192</td>
<td align="char" valign="top" char=".">0.085</td>
<td align="char" valign="top" char=".">0.136</td>
<td align="char" valign="top" char=".">0.077</td>
<td align="char" valign="top" char=".">0.126</td>
</tr>
<tr>
<td align="center" valign="top">G9</td>
<td align="char" valign="top" char=".">0.240</td>
<td align="char" valign="top" char=".">0.700</td>
<td align="char" valign="top" char=".">0.203</td>
<td align="char" valign="top" char=".">0.114</td>
<td align="char" valign="top" char=".">0.156</td>
<td align="char" valign="top" char=".">0.361</td>
<td align="char" valign="top" char=".">&#x2212;0.090</td>
</tr>
<tr>
<td align="center" valign="top">G10</td>
<td align="char" valign="top" char=".">0.189</td>
<td align="char" valign="top" char=".">0.504</td>
<td align="char" valign="top" char=".">0.219</td>
<td align="char" valign="top" char=".">0.072</td>
<td align="char" valign="top" char=".">0.258</td>
<td align="char" valign="top" char=".">0.349</td>
<td align="char" valign="top" char=".">&#x2212;0.089</td>
</tr>
<tr>
<td align="center" valign="top">G11</td>
<td align="char" valign="top" char=".">0.103</td>
<td align="char" valign="top" char=".">0.504</td>
<td align="char" valign="top" char=".">0.234</td>
<td align="char" valign="top" char=".">&#x2212;0.020</td>
<td align="char" valign="top" char=".">0.366</td>
<td align="char" valign="top" char=".">0.196</td>
<td align="char" valign="top" char=".">&#x2212;0.011</td>
</tr>
<tr>
<td align="left" valign="top" colspan="2">Eigenvalues</td>
<td align="char" valign="top" char=".">7.908</td>
<td align="char" valign="top" char=".">7.858</td>
<td align="char" valign="top" char=".">4.758</td>
<td align="char" valign="top" char=".">4.504</td>
<td align="char" valign="top" char=".">3.575</td>
<td align="char" valign="top" char=".">3.397</td>
<td align="char" valign="top" char=".">3.379</td>
</tr>
<tr>
<td align="left" valign="top" colspan="2">Dispersion (%)</td>
<td align="char" valign="top" char=".">17.573</td>
<td align="char" valign="top" char=".">17.461</td>
<td align="char" valign="top" char=".">10.573</td>
<td align="char" valign="top" char=".">10.009</td>
<td align="char" valign="top" char=".">7.944</td>
<td align="char" valign="top" char=".">7.549</td>
<td align="char" valign="top" char=".">7.510</td>
</tr>
<tr>
<td align="left" valign="top" colspan="2">Cumulative (%)</td>
<td align="char" valign="top" char=".">17.573</td>
<td align="char" valign="top" char=".">35.035</td>
<td align="char" valign="top" char=".">45.608</td>
<td align="char" valign="top" char=".">55.617</td>
<td align="char" valign="top" char=".">63.562</td>
<td align="char" valign="top" char=".">71.110</td>
<td align="char" valign="top" char=".">78.620</td>
</tr>
<tr>
<td align="left" valign="top" colspan="9">KMO&#x2009;=&#x2009;0.945 (sig&#x2009;=&#x2009;0.000)</td>
</tr>
</tbody>
</table>
<table-wrap-foot>
<p>Factor loadings are above 0.50 (with a range of 0.504&#x2013;0.876). Factor1: psychological distress; Factor2: Procrastination; Factor3: Leader&#x2019;s incivility; Factor4: Exploitative leadership; Factor5: Rationalized hiding; Factor6: Evasive hiding; Factor7: Playing dumb. Loading factors on items are shaded dark gray.</p>
</table-wrap-foot>
</table-wrap>
</sec>
<sec id="sec11">
<label>4.2</label>
<title>Confirmatory factor analysis and validity analysis</title>
<p>A confirmatory factor analysis (CFA) was conducted to determine the goodness of model fit. Five models were tested, and the model fit index was compared.</p>
<p>Model 1 was our research model, in which all variables were input simultaneously and loaded independently. The results revealed <italic>X</italic><sup>2</sup> (<italic>p</italic>)&#x2009;=&#x2009;2359.159(0.000), <italic>X</italic><sup>2</sup>/df&#x2009;=&#x2009;2.595, RMSEA&#x2009;=&#x2009;0.075, IFI&#x2009;=&#x2009;0.902, CFI&#x2009;=&#x2009;0.901, PNFI&#x2009;=&#x2009;0.780, and PGFI&#x2009;=&#x2009;0.630. that model 1 showed the best model fit compared to the other four alternative models. These results indicate that Model 1 had the best fit index. <xref ref-type="table" rid="tab2">Table 2</xref> summarizes the results of the structural model.</p>
<table-wrap position="float" id="tab2">
<label>Table 2</label>
<caption>
<p>Summary of the results of the structural model fit.</p>
</caption>
<table frame="hsides" rules="groups">
<thead>
<tr>
<th align="left" valign="top">Model</th>
<th align="center" valign="top"><italic>&#x03C7;</italic><sup>2</sup>(<italic>p</italic>)</th>
<th align="center" valign="top"><italic>&#x03C7;</italic><sup>2</sup>/df</th>
<th align="center" valign="top">RMSEA</th>
<th align="center" valign="top">IFI</th>
<th align="center" valign="top">CFI</th>
<th align="center" valign="top">PNFI</th>
<th align="center" valign="top">PGFI</th>
</tr>
</thead>
<tbody>
<tr>
<td align="left" valign="middle">Model 1 (Expected model of seven-factor<sup>a</sup>)</td>
<td align="char" valign="middle" char="(">2359.159 (0.000)</td>
<td align="char" valign="middle" char=".">2.595</td>
<td align="char" valign="middle" char=".">0.075</td>
<td align="char" valign="middle" char=".">0.902</td>
<td align="char" valign="middle" char=".">0.901</td>
<td align="char" valign="middle" char=".">0.780</td>
<td align="char" valign="middle" char=".">0.630</td>
</tr>
<tr>
<td align="left" valign="middle">Model 2 (Six-factor<sup>b</sup>)</td>
<td align="char" valign="middle" char="(">2890.113 (0.000)</td>
<td align="char" valign="middle" char=".">3.292</td>
<td align="char" valign="middle" char=".">0.090</td>
<td align="char" valign="middle" char=".">0.859</td>
<td align="char" valign="middle" char=".">0.859</td>
<td align="char" valign="middle" char=".">0.751</td>
<td align="char" valign="middle" char=".">0.589</td>
</tr>
<tr>
<td align="left" valign="middle">Model 3 (Six-factor<sup>c</sup>)</td>
<td align="char" valign="middle" char="(">4100.774 (0.000)</td>
<td align="char" valign="middle" char=".">4.438</td>
<td align="char" valign="middle" char=".">0.110</td>
<td align="char" valign="middle" char=".">0.785</td>
<td align="char" valign="middle" char=".">0.784</td>
<td align="char" valign="middle" char=".">0.689</td>
<td align="char" valign="middle" char=".">0.450</td>
</tr>
<tr>
<td align="left" valign="middle">Model 4 (five-factor<sup>d</sup>)</td>
<td align="char" valign="middle" char="(">4938.382 (0.000)</td>
<td align="char" valign="middle" char=".">5.322</td>
<td align="char" valign="middle" char=".">0.123</td>
<td align="char" valign="middle" char=".">0.728</td>
<td align="char" valign="middle" char=".">0.727</td>
<td align="char" valign="middle" char=".">0.642</td>
<td align="char" valign="middle" char=".">0.394</td>
</tr>
<tr>
<td align="left" valign="middle">Model 5 (four-factor<sup>e</sup>)</td>
<td align="char" valign="middle" char="(">4537.496 (0.000)</td>
<td align="char" valign="middle" char=".">4.905</td>
<td align="char" valign="middle" char=".">0.117</td>
<td align="char" valign="middle" char=".">0.755</td>
<td align="char" valign="middle" char=".">0.754</td>
<td align="char" valign="middle" char=".">0.664</td>
<td align="char" valign="middle" char=".">0.468</td>
</tr>
</tbody>
</table>
<table-wrap-foot>
<p><sup>a</sup>Exploitative Leadership, Psychological Distress, Supervisor&#x2019;s Incivility, Playing Dumb, Evasive Hiding, Rationalized Hiding, Procrastination. <sup>b</sup>Exploitative Leadership and Supervisor&#x2019;s Incivility, Psychological Distress, Playing Dumb, Evasive Hiding, Rationalized Hiding, Procrastination. <sup>c</sup>Exploitative Leadership and Psychological Distress, Supervisor&#x2019;s Incivility, Playing Dumb, Evasive Hiding, Rationalized Hiding, Procrastination. <sup>d</sup>Playing Dumb and Evasive Hiding and Rationalized Hiding, Exploitative Leadership, Psychological Distress, Supervisor&#x2019;s Incivility, Procrastination. <sup>e</sup>Playing Dumb and Evasive Hiding and Rationalized Hiding, Procrastination, Exploitative Leadership, Psychological Distress, Supervisor incivility.</p>
</table-wrap-foot>
</table-wrap>
<p><xref ref-type="table" rid="tab3">Table 3</xref> presents the results of the CFA and the convergent validity analysis. As shown, the research model showed a good fit for our data with <italic>X</italic><sup>2</sup> (<italic>p</italic>)&#x2009;=&#x2009;2359.159(0.000), <italic>X</italic><sup>2</sup>/df&#x2009;=&#x2009;2.595, RMSEA&#x2009;=&#x2009;0.075, IFI&#x2009;=&#x2009;0.902, CFI&#x2009;=&#x2009;0.901, PGFI&#x2009;=&#x2009;0.630, and PNFI&#x2009;=&#x2009;0.780. These indices satisfy the acceptable requirement (<xref ref-type="bibr" rid="ref48">Jin and Hahm, 2021</xref>; <xref ref-type="bibr" rid="ref49">Jin et al., 2022</xref>). Moreover, the standardized regression weights of exploitative leadership, psychological distress, leader&#x2019;s incivility, playing dumb, evasive hiding, rationalized hiding, and procrastination were all higher than 0.5. These results indicated that all items loaded significantly on the factors.</p>
<table-wrap position="float" id="tab3">
<label>Table 3</label>
<caption>
<p>The results of confirmatory factor analysis and convergent validity analysis.</p>
</caption>
<table frame="hsides" rules="groups">
<thead>
<tr>
<th align="left" valign="top" colspan="2">Variables</th>
<th align="center" valign="top">Estimate</th>
<th align="center" valign="top">SE</th>
<th align="center" valign="top">CR</th>
<th align="center" valign="top">
<italic>p</italic>
</th>
<th align="center" valign="top">Standardized regression weights</th>
<th align="center" valign="top">AVE</th>
<th align="center" valign="top">C.R</th>
</tr>
</thead>
<tbody>
<tr>
<td align="left" valign="middle" rowspan="5">Exploitative leadership(A)</td>
<td align="center" valign="middle">A1</td>
<td align="char" valign="middle" char=".">1</td>
<td/>
<td/>
<td/>
<td align="char" valign="middle" char=".">0.645</td>
<td align="char" valign="middle" char="." rowspan="5">0.600</td>
<td align="char" valign="middle" char="." rowspan="5">0.722</td>
</tr>
<tr>
<td align="center" valign="middle">A2</td>
<td align="char" valign="middle" char=".">1.489</td>
<td align="char" valign="middle" char=".">0.084</td>
<td align="char" valign="middle" char=".">17.716</td>
<td align="char" valign="middle" char=".">&#x002A;&#x002A;&#x002A;</td>
<td align="char" valign="middle" char=".">0.831</td>
</tr>
<tr>
<td align="center" valign="middle">A3</td>
<td align="char" valign="middle" char=".">1.463</td>
<td align="char" valign="middle" char=".">0.077</td>
<td align="char" valign="middle" char=".">18.913</td>
<td align="char" valign="middle" char=".">&#x002A;&#x002A;&#x002A;</td>
<td align="char" valign="middle" char=".">0.863</td>
</tr>
<tr>
<td align="center" valign="middle">A4</td>
<td align="char" valign="middle" char=".">1.298</td>
<td align="char" valign="middle" char=".">0.078</td>
<td align="char" valign="middle" char=".">16.713</td>
<td align="char" valign="middle" char=".">&#x002A;&#x002A;&#x002A;</td>
<td align="char" valign="middle" char=".">0.803</td>
</tr>
<tr>
<td align="center" valign="middle">A5</td>
<td align="char" valign="middle" char=".">1.307</td>
<td align="char" valign="middle" char=".">0.094</td>
<td align="char" valign="middle" char=".">13.854</td>
<td align="char" valign="middle" char=".">&#x002A;&#x002A;&#x002A;</td>
<td align="char" valign="middle" char=".">0.711</td>
</tr>
<tr>
<td align="left" valign="middle" rowspan="10">Psychological distress(B)</td>
<td align="center" valign="middle">B1</td>
<td align="char" valign="middle" char=".">1</td>
<td/>
<td/>
<td/>
<td align="char" valign="middle" char=".">0.710</td>
<td align="char" valign="middle" char="." rowspan="10">0.624</td>
<td align="char" valign="middle" char="." rowspan="10">0.884</td>
</tr>
<tr>
<td align="center" valign="middle">B2</td>
<td align="char" valign="middle" char=".">1.045</td>
<td align="char" valign="middle" char=".">0.053</td>
<td align="char" valign="middle" char=".">19.667</td>
<td align="char" valign="middle" char=".">&#x002A;&#x002A;&#x002A;</td>
<td align="char" valign="middle" char=".">0.760</td>
</tr>
<tr>
<td align="center" valign="middle">B3</td>
<td align="char" valign="middle" char=".">1.099</td>
<td align="char" valign="middle" char=".">0.078</td>
<td align="char" valign="middle" char=".">14.13</td>
<td align="char" valign="middle" char=".">&#x002A;&#x002A;&#x002A;</td>
<td align="char" valign="middle" char=".">0.700</td>
</tr>
<tr>
<td align="center" valign="middle">B4</td>
<td align="char" valign="middle" char=".">1.166</td>
<td align="char" valign="middle" char=".">0.068</td>
<td align="char" valign="middle" char=".">17.27</td>
<td align="char" valign="middle" char=".">&#x002A;&#x002A;&#x002A;</td>
<td align="char" valign="middle" char=".">0.798</td>
</tr>
<tr>
<td align="center" valign="middle">B5</td>
<td align="char" valign="middle" char=".">1.120</td>
<td align="char" valign="middle" char=".">0.072</td>
<td align="char" valign="middle" char=".">15.506</td>
<td align="char" valign="middle" char=".">&#x002A;&#x002A;&#x002A;</td>
<td align="char" valign="middle" char=".">0.747</td>
</tr>
<tr>
<td align="center" valign="middle">B6</td>
<td align="char" valign="middle" char=".">1.256</td>
<td align="char" valign="middle" char=".">0.066</td>
<td align="char" valign="middle" char=".">18.908</td>
<td align="char" valign="middle" char=".">&#x002A;&#x002A;&#x002A;</td>
<td align="char" valign="middle" char=".">0.835</td>
</tr>
<tr>
<td align="center" valign="middle">B7</td>
<td align="char" valign="middle" char=".">1.217</td>
<td align="char" valign="middle" char=".">0.066</td>
<td align="char" valign="middle" char=".">18.458</td>
<td align="char" valign="middle" char=".">&#x002A;&#x002A;&#x002A;</td>
<td align="char" valign="middle" char=".">0.823</td>
</tr>
<tr>
<td align="center" valign="middle">B8</td>
<td align="char" valign="middle" char=".">1.305</td>
<td align="char" valign="middle" char=".">0.068</td>
<td align="char" valign="middle" char=".">19.335</td>
<td align="char" valign="middle" char=".">&#x002A;&#x002A;&#x002A;</td>
<td align="char" valign="middle" char=".">0.847</td>
</tr>
<tr>
<td align="center" valign="middle">B9</td>
<td align="char" valign="middle" char=".">1.263</td>
<td align="char" valign="middle" char=".">0.063</td>
<td align="char" valign="middle" char=".">20.169</td>
<td align="char" valign="middle" char=".">&#x002A;&#x002A;&#x002A;</td>
<td align="char" valign="middle" char=".">0.861</td>
</tr>
<tr>
<td align="center" valign="middle">B10</td>
<td align="char" valign="middle" char=".">1.153</td>
<td align="char" valign="middle" char=".">0.065</td>
<td align="char" valign="middle" char=".">17.665</td>
<td align="char" valign="middle" char=".">&#x002A;&#x002A;&#x002A;</td>
<td align="char" valign="middle" char=".">0.803</td>
</tr>
<tr>
<td align="left" valign="middle" rowspan="4">Playing dumb (C)</td>
<td align="center" valign="middle">C1</td>
<td align="char" valign="middle" char=".">1</td>
<td/>
<td/>
<td/>
<td align="char" valign="middle" char=".">0.754</td>
<td align="char" valign="middle" char="." rowspan="4">0.745</td>
<td align="char" valign="middle" char="." rowspan="4">0.859</td>
</tr>
<tr>
<td align="center" valign="middle">C2</td>
<td align="char" valign="middle" char=".">1.236</td>
<td align="char" valign="middle" char=".">0.056</td>
<td align="char" valign="middle" char=".">21.91</td>
<td align="char" valign="middle" char=".">&#x002A;&#x002A;&#x002A;</td>
<td align="char" valign="middle" char=".">0.89</td>
</tr>
<tr>
<td align="center" valign="middle">C3</td>
<td align="char" valign="middle" char=".">1.297</td>
<td align="char" valign="middle" char=".">0.057</td>
<td align="char" valign="middle" char=".">22.71</td>
<td align="char" valign="middle" char=".">&#x002A;&#x002A;&#x002A;</td>
<td align="char" valign="middle" char=".">0.905</td>
</tr>
<tr>
<td align="center" valign="middle">C4</td>
<td align="char" valign="middle" char=".">1.295</td>
<td align="char" valign="middle" char=".">0.058</td>
<td align="char" valign="middle" char=".">22.175</td>
<td align="char" valign="middle" char=".">&#x002A;&#x002A;&#x002A;</td>
<td align="char" valign="middle" char=".">0.895</td>
</tr>
<tr>
<td align="left" valign="middle" rowspan="4">Evasive hiding(D)</td>
<td align="center" valign="middle">D1</td>
<td align="char" valign="middle" char=".">1</td>
<td/>
<td/>
<td/>
<td align="char" valign="middle" char=".">0.770</td>
<td align="char" valign="middle" char="." rowspan="4">0.721</td>
<td align="char" valign="middle" char="." rowspan="4">0.854</td>
</tr>
<tr>
<td align="center" valign="middle">D2</td>
<td align="char" valign="middle" char=".">1.15</td>
<td align="char" valign="middle" char=".">0.046</td>
<td align="char" valign="middle" char=".">24.915</td>
<td align="char" valign="middle" char=".">&#x002A;&#x002A;&#x002A;</td>
<td align="char" valign="middle" char=".">0.887</td>
</tr>
<tr>
<td align="center" valign="middle">D3</td>
<td align="char" valign="middle" char=".">1.145</td>
<td align="char" valign="middle" char=".">0.044</td>
<td align="char" valign="middle" char=".">25.774</td>
<td align="char" valign="middle" char=".">&#x002A;&#x002A;&#x002A;</td>
<td align="char" valign="middle" char=".">0.864</td>
</tr>
<tr>
<td align="center" valign="middle">D4</td>
<td align="char" valign="middle" char=".">1.221</td>
<td align="char" valign="middle" char=".">0.059</td>
<td align="char" valign="middle" char=".">20.603</td>
<td align="char" valign="middle" char=".">&#x002A;&#x002A;&#x002A;</td>
<td align="char" valign="middle" char=".">0.871</td>
</tr>
<tr>
<td align="left" valign="middle" rowspan="4">Rationalized hiding(E)</td>
<td align="center" valign="middle">E1</td>
<td align="char" valign="middle" char=".">1</td>
<td/>
<td/>
<td/>
<td align="char" valign="middle" char=".">0.629</td>
<td align="char" valign="middle" char="." rowspan="4">0.667</td>
<td align="char" valign="middle" char="." rowspan="4">0.763</td>
</tr>
<tr>
<td align="center" valign="middle">E2</td>
<td align="char" valign="middle" char=".">1.282</td>
<td align="char" valign="middle" char=".">0.073</td>
<td align="char" valign="middle" char=".">17.593</td>
<td align="char" valign="middle" char=".">&#x002A;&#x002A;&#x002A;</td>
<td align="char" valign="middle" char=".">0.825</td>
</tr>
<tr>
<td align="center" valign="middle">E3</td>
<td align="char" valign="middle" char=".">1.407</td>
<td align="char" valign="middle" char=".">0.069</td>
<td align="char" valign="middle" char=".">20.401</td>
<td align="char" valign="middle" char=".">&#x002A;&#x002A;&#x002A;</td>
<td align="char" valign="middle" char=".">0.928</td>
</tr>
<tr>
<td align="center" valign="middle">E4</td>
<td align="char" valign="middle" char=".">1.307</td>
<td align="char" valign="middle" char=".">0.07</td>
<td align="char" valign="middle" char=".">18.594</td>
<td align="char" valign="middle" char=".">&#x002A;&#x002A;&#x002A;</td>
<td align="char" valign="middle" char=".">0.854</td>
</tr>
<tr>
<td align="left" valign="middle" rowspan="7">Leader&#x2019;s incivility (F)</td>
<td align="center" valign="middle">F1</td>
<td align="char" valign="middle" char=".">1</td>
<td/>
<td/>
<td/>
<td align="char" valign="middle" char=".">0.551</td>
<td align="char" valign="middle" char="." rowspan="7">0.694</td>
<td align="char" valign="middle" char="." rowspan="7">0.852</td>
</tr>
<tr>
<td align="center" valign="middle">F2</td>
<td align="char" valign="middle" char=".">1.335</td>
<td align="char" valign="middle" char=".">0.066</td>
<td align="char" valign="middle" char=".">20.151</td>
<td align="char" valign="middle" char=".">&#x002A;&#x002A;&#x002A;</td>
<td align="char" valign="middle" char=".">0.876</td>
</tr>
<tr>
<td align="center" valign="middle">F3</td>
<td align="char" valign="middle" char=".">1.315</td>
<td align="char" valign="middle" char=".">0.072</td>
<td align="char" valign="middle" char=".">18.171</td>
<td align="char" valign="middle" char=".">&#x002A;&#x002A;&#x002A;</td>
<td align="char" valign="middle" char=".">0.839</td>
</tr>
<tr>
<td align="center" valign="middle">F4</td>
<td align="char" valign="middle" char=".">1.37</td>
<td align="char" valign="middle" char=".">0.066</td>
<td align="char" valign="middle" char=".">20.897</td>
<td align="char" valign="middle" char=".">&#x002A;&#x002A;&#x002A;</td>
<td align="char" valign="middle" char=".">0.896</td>
</tr>
<tr>
<td align="center" valign="middle">F5</td>
<td align="char" valign="middle" char=".">1.395</td>
<td align="char" valign="middle" char=".">0.065</td>
<td align="char" valign="middle" char=".">21.388</td>
<td align="char" valign="middle" char=".">&#x002A;&#x002A;&#x002A;</td>
<td align="char" valign="middle" char=".">0.926</td>
</tr>
<tr>
<td align="center" valign="middle">F6</td>
<td align="char" valign="middle" char=".">1.307</td>
<td align="char" valign="middle" char=".">0.072</td>
<td align="char" valign="middle" char=".">18.244</td>
<td align="char" valign="middle" char=".">&#x002A;&#x002A;&#x002A;</td>
<td align="char" valign="middle" char=".">0.831</td>
</tr>
<tr>
<td align="center" valign="middle">F7</td>
<td align="char" valign="middle" char=".">1.376</td>
<td align="char" valign="middle" char=".">0.072</td>
<td align="char" valign="middle" char=".">19.1</td>
<td align="char" valign="middle" char=".">&#x002A;&#x002A;&#x002A;</td>
<td align="char" valign="middle" char=".">0.855</td>
</tr>
<tr>
<td align="left" valign="middle" rowspan="11">Procrastination(G)</td>
<td align="center" valign="middle">G1</td>
<td align="char" valign="middle" char=".">1</td>
<td/>
<td/>
<td/>
<td align="char" valign="middle" char=".">0.561</td>
<td align="char" valign="middle" char="." rowspan="11">0.628</td>
<td align="char" valign="middle" char="." rowspan="11">0.878</td>
</tr>
<tr>
<td align="center" valign="middle">G2</td>
<td align="char" valign="middle" char=".">0.94</td>
<td align="char" valign="middle" char=".">0.076</td>
<td align="char" valign="middle" char=".">12.393</td>
<td align="char" valign="middle" char=".">&#x002A;&#x002A;&#x002A;</td>
<td align="char" valign="middle" char=".">0.580</td>
</tr>
<tr>
<td align="center" valign="middle">G3</td>
<td align="char" valign="middle" char=".">1.153</td>
<td align="char" valign="middle" char=".">0.072</td>
<td align="char" valign="middle" char=".">16.056</td>
<td align="char" valign="middle" char=".">&#x002A;&#x002A;&#x002A;</td>
<td align="char" valign="middle" char=".">0.742</td>
</tr>
<tr>
<td align="center" valign="middle">G4</td>
<td align="char" valign="middle" char=".">1.298</td>
<td align="char" valign="middle" char=".">0.069</td>
<td align="char" valign="middle" char=".">18.937</td>
<td align="char" valign="middle" char=".">&#x002A;&#x002A;&#x002A;</td>
<td align="char" valign="top" char=".">0.848</td>
</tr>
<tr>
<td align="center" valign="top">G5</td>
<td align="char" valign="top" char=".">1.264</td>
<td align="char" valign="top" char=".">0.074</td>
<td align="char" valign="top" char=".">17.174</td>
<td align="char" valign="top" char=".">&#x002A;&#x002A;&#x002A;</td>
<td align="char" valign="top" char=".">0.802</td>
</tr>
<tr>
<td align="center" valign="top">G6</td>
<td align="char" valign="top" char=".">1.335</td>
<td align="char" valign="top" char=".">0.072</td>
<td align="char" valign="top" char=".">18.621</td>
<td align="char" valign="top" char=".">&#x002A;&#x002A;&#x002A;</td>
<td align="char" valign="top" char=".">0.843</td>
</tr>
<tr>
<td align="center" valign="top">G7</td>
<td align="char" valign="top" char=".">1.329</td>
<td align="char" valign="top" char=".">0.066</td>
<td align="char" valign="top" char=".">20.122</td>
<td align="char" valign="top" char=".">&#x002A;&#x002A;&#x002A;</td>
<td align="char" valign="top" char=".">0.876</td>
</tr>
<tr>
<td align="center" valign="top">G8</td>
<td align="char" valign="top" char=".">1.315</td>
<td align="char" valign="top" char=".">0.066</td>
<td align="char" valign="top" char=".">19.869</td>
<td align="char" valign="top" char=".">&#x002A;&#x002A;&#x002A;</td>
<td align="char" valign="top" char=".">0.871</td>
</tr>
<tr>
<td align="center" valign="top">G9</td>
<td align="char" valign="top" char=".">1.309</td>
<td align="char" valign="top" char=".">0.068</td>
<td align="char" valign="top" char=".">19.376</td>
<td align="char" valign="top" char=".">&#x002A;&#x002A;&#x002A;</td>
<td align="char" valign="top" char=".">0.860</td>
</tr>
<tr>
<td align="center" valign="top">G10</td>
<td align="char" valign="top" char=".">1.28</td>
<td align="char" valign="top" char=".">0.067</td>
<td align="char" valign="top" char=".">19.043</td>
<td align="char" valign="top" char=".">&#x002A;&#x002A;&#x002A;</td>
<td align="char" valign="top" char=".">0.854</td>
</tr>
<tr>
<td align="center" valign="top">G11</td>
<td align="char" valign="top" char=".">1.232</td>
<td align="char" valign="top" char=".">0.072</td>
<td align="char" valign="top" char=".">17.053</td>
<td align="char" valign="top" char=".">&#x002A;&#x002A;&#x002A;</td>
<td align="char" valign="top" char=".">0.801</td>
</tr>
<tr>
<td align="left" valign="top">Model fit index</td>
<td align="center" valign="top" colspan="8"><italic>X</italic><sup>2</sup> (<italic>p</italic>)&#x2009;=&#x2009;2359.159(0.000), X2/df&#x2009;=&#x2009;2.595, RMSEA&#x2009;=&#x2009;0.075, IFI&#x2009;=&#x2009;0.902, CFI&#x2009;=&#x2009;0.901, PGFI&#x2009;=&#x2009;0.630, PNFI&#x2009;=&#x2009;0.780</td>
</tr>
</tbody>
</table>
<table-wrap-foot>
<p>Exploitative leadership (AVE&#x2009;=&#x2009;0.600, C.R&#x2009;=&#x2009;0.722), Psychological distress (AVE&#x2009;=&#x2009;0.624, C.R&#x2009;=&#x2009;0.884), Playing dumb (AVE&#x2009;=&#x2009;0.745, C.R&#x2009;=&#x2009;0.859), Evasive hiding (AVE&#x2009;=&#x2009;0.721, C.R&#x2009;=&#x2009;0.854), Rationalized hiding (AVE&#x2009;=&#x2009;0.667, C.R&#x2009;=&#x2009;0.763), Leader&#x2019;s incivility (AVE&#x2009;=&#x2009;0.694, C.R&#x2009;=&#x2009;0.852), Procrastination (AVE&#x2009;=&#x2009;0.628, C.R&#x2009;=&#x2009;0.878).</p>
</table-wrap-foot>
</table-wrap>
<p>In addition, we calculated the average variance extracted (AVE) and composite reliability (CR) to verify convergent validity. The AVE for exploitative leadership, psychological distress, leader incivility, playing dumb, evasive hiding, rationalized hiding, and procrastination were all greater than 0.6. CR for exploitative leadership, psychological distress, leader&#x2019;s incivility, playing dumb, evasive hiding, rationalized hiding, and procrastination was all higher than 0.7. Overall, the value of AVE and CR satisfied acceptable requirements (<xref ref-type="bibr" rid="ref48">Jin and Hahm, 2021</xref>; <xref ref-type="bibr" rid="ref49">Jin et al., 2022</xref>). Thus, all measurements had significant validity.</p>
<p>After testing and checking convergent validity, we used the Fornell-Larcker criterion to investigate the significance of discriminant validity. The results showed that the AVE value was greater than the square of the correlation for each set of constructs. Furthermore, the square root of the AVE for a given construct was higher than the absolute value of the squared correlation of the construct with other factors. Specifically, all square root values of the AVE for all constructs were higher than the correlation between the construct and the other constructs in the current model. According to these results, discriminant validity was significant and supported. <xref ref-type="table" rid="tab4">Table 4</xref> shows the results of discriminant validity.</p>
<table-wrap position="float" id="tab4">
<label>Table 4</label>
<caption>
<p>The results of discriminant validity.</p>
</caption>
<table frame="hsides" rules="groups">
<thead>
<tr>
<th/>
<th align="center" valign="top">1</th>
<th align="center" valign="top">2</th>
<th align="center" valign="top">3</th>
<th align="center" valign="top">4</th>
<th align="center" valign="top">5</th>
<th align="center" valign="top">6</th>
<th align="center" valign="top">7</th>
</tr>
</thead>
<tbody>
<tr>
<td align="left" valign="middle">1</td>
<td align="char" valign="middle" char=".">
<bold>(0.775)</bold>
</td>
<td/>
<td/>
<td/>
<td/>
<td/>
<td/>
</tr>
<tr>
<td align="left" valign="middle">2</td>
<td align="char" valign="middle" char=".">0.121</td>
<td align="char" valign="middle" char=".">
<bold>(0.790)</bold>
</td>
<td/>
<td/>
<td/>
<td/>
<td/>
</tr>
<tr>
<td align="left" valign="middle">3</td>
<td align="char" valign="middle" char=".">0.298</td>
<td align="char" valign="middle" char=".">0.346</td>
<td align="char" valign="middle" char=".">
<bold>(0.833)</bold>
</td>
<td/>
<td/>
<td/>
<td/>
</tr>
<tr>
<td align="left" valign="middle">4</td>
<td align="char" valign="middle" char=".">0.121</td>
<td align="char" valign="middle" char=".">0.194</td>
<td align="char" valign="middle" char=".">0.362</td>
<td align="char" valign="middle" char=".">
<bold>(0.863)</bold>
</td>
<td/>
<td/>
<td/>
</tr>
<tr>
<td align="left" valign="middle">5</td>
<td align="char" valign="middle" char=".">0.128</td>
<td align="char" valign="middle" char=".">0.243</td>
<td align="char" valign="middle" char=".">0.454</td>
<td align="char" valign="middle" char=".">0.370</td>
<td align="char" valign="middle" char=".">
<bold>(0.849)</bold>
</td>
<td/>
<td/>
</tr>
<tr>
<td align="left" valign="middle">6</td>
<td align="char" valign="middle" char=".">0.057</td>
<td align="char" valign="middle" char=".">0.100</td>
<td align="char" valign="middle" char=".">0.166</td>
<td align="char" valign="middle" char=".">0.320</td>
<td align="char" valign="middle" char=".">0.232</td>
<td align="char" valign="middle" char=".">
<bold>(0.817)</bold>
</td>
<td/>
</tr>
<tr>
<td align="left" valign="middle">7</td>
<td align="char" valign="middle" char=".">0.110</td>
<td align="char" valign="middle" char=".">0.316</td>
<td align="char" valign="middle" char=".">0.372</td>
<td align="char" valign="middle" char=".">0.355</td>
<td align="char" valign="middle" char=".">0.445</td>
<td align="char" valign="middle" char=".">0.186</td>
<td align="char" valign="middle" char=".">
<bold>(0.792)</bold>
</td>
</tr>
</tbody>
</table>
<table-wrap-foot>
<p>1&#x2009;=&#x2009;Exploitative Leadership, 2&#x2009;=&#x2009;Psychological Distress, 3&#x2009;=&#x2009;Supervisor&#x2019;s incivility, 4&#x2009;=&#x2009;Playing Dumb, 5&#x2009;=&#x2009;Evasive Hiding, 6&#x2009;=&#x2009;Rationalized Hiding, 7&#x2009;=&#x2009;Procrastination. Each diagonal element (bolded) is the AVE value, and the other elements are the correlation squares between variables.</p>
</table-wrap-foot>
</table-wrap>
</sec>
<sec id="sec12">
<label>4.3</label>
<title>Test of common method variance</title>
<p>Common method variance (CMV) is an issue that could threaten the validity of linkage outcomes between constructs (<xref ref-type="bibr" rid="ref102">Williams and Brown, 1994</xref>; <xref ref-type="bibr" rid="ref83">Reio, 2010</xref>).</p>
<p>In order to test for CMV, we performed EFA and calculated both the eigenvalues and total variance. Psychological distress was factor 1 and accounted for 17.573%, procrastination was factor 2 and accounted for 17.461%, leaders&#x2019; incivility was factor 3 and accounted for 10.573, exploitative leadership was factor 4 and accounted for 10.009%, rationalized hiding was factor 5 and accounted for 7.944%, evasive hiding was factor 6 and accounted for 7.549%, and playing dumb was factor 7 and accounted for 7.510% of the variance. All eigenvalues were greater than 1 and the value of the total variance was lower than 40%. These results indicate that CMV was not a problem in this study.</p>
</sec>
<sec id="sec13">
<label>4.4</label>
<title>Test of reliability</title>
<p>To validate the measures, we evaluated Cronbach&#x2019;s alpha for each latent construct. As shown in <xref ref-type="table" rid="tab4">Table 4</xref>, all Cronbach&#x2019;s alpha values were acceptable and each value was higher than 0.70, as suggested by <xref ref-type="bibr" rid="ref73">Nunnally (1978)</xref>. Specifically, Cronbach&#x2019;s alpha values were as follows: exploitative leadership, 0.937; psychological distress, 0.959; supervisor&#x2019;s incivility, 0.951; playing dumb, 0.956; evasive hiding, 0.959; rationalized hiding, 0.884; and procrastination, 0.955. As presented in <xref ref-type="table" rid="tab5">Table 5</xref>, Cronbach&#x2019;s alpha values for all the research variables were higher than the acceptable level of 0.70.</p>
<table-wrap position="float" id="tab5">
<label>Table 5</label>
<caption>
<p>Results of the reliability analysis.</p>
</caption>
<table frame="hsides" rules="groups">
<thead>
<tr>
<th align="left" valign="top">Variable</th>
<th align="left" valign="top">Items</th>
<th align="left" valign="top">Cronbach&#x2019;s alpha</th>
</tr>
</thead>
<tbody>
<tr>
<td align="left" valign="middle" rowspan="5">Exploitative leadership</td>
<td align="left" valign="middle">1. My leader takes it for granted that my work can be used for his or her personal benefit.</td>
<td align="char" valign="middle" char="." rowspan="5">0.937</td>
</tr>
<tr>
<td align="left" valign="middle">2. My leader benefits from my work without sharing the praise.</td>
</tr>
<tr>
<td align="left" valign="middle">3. My leader puts me under pressure to reach his or her personal goals.</td>
</tr>
<tr>
<td align="left" valign="middle">4. My leader plays my colleagues and me off against each other to reach his or her goals.</td>
</tr>
<tr>
<td align="left" valign="middle">5. My leader does not allow me to develop professionally, as his or her goals are the priority.</td>
</tr>
<tr>
<td align="left" valign="middle" rowspan="10">Psychological distress</td>
<td align="left" valign="middle">1. I feel depressed.</td>
<td align="char" valign="middle" char="." rowspan="10">0.959</td>
</tr>
<tr>
<td align="left" valign="middle">2. I feel so depressed that nothing could cheer me up.</td>
</tr>
<tr>
<td align="left" valign="middle">3. I feel hopeless.</td>
</tr>
<tr>
<td align="left" valign="middle">4. I feel restless or fidgety.</td>
</tr>
<tr>
<td align="left" valign="middle">5. I feel so restless that I could not sit still.</td>
</tr>
<tr>
<td align="left" valign="middle">6. I feel tired out for no good reason.</td>
</tr>
<tr>
<td align="left" valign="middle">7. I feel that everything is an effort.</td>
</tr>
<tr>
<td align="left" valign="middle">8. I feel worthless.</td>
</tr>
<tr>
<td align="left" valign="middle">9. I feel nervous.</td>
</tr>
<tr>
<td align="left" valign="middle">10. I feel so nervous that nothing could calm me down.</td>
</tr>
<tr>
<td align="left" valign="middle" rowspan="7">Leader&#x2019;s incivility</td>
<td align="left" valign="middle">1. My leader puts me down or is condescending to me.</td>
<td align="char" valign="middle" char="." rowspan="7">0.951</td>
</tr>
<tr>
<td align="left" valign="middle">2. My leader pays little attention to my statement or shows little interest in my opinion.</td>
</tr>
<tr>
<td align="left" valign="middle">3. My leader makes demeaning or derogatory remarks about me.</td>
</tr>
<tr>
<td align="left" valign="middle">My leader addresses me in unprofessional terms, either publicly or privately.</td>
</tr>
<tr>
<td align="left" valign="middle">5. My leader ignores or excludes me from professional camaraderie.</td>
</tr>
<tr>
<td align="left" valign="middle">6. My leader doubts my judgment on a matter over which I have responsibility.</td>
</tr>
<tr>
<td align="left" valign="middle">7. My leader makes unwanted attempts to draw me into a discussion of personal matters.</td>
</tr>
<tr>
<td align="left" valign="middle" rowspan="4">Playing dumb</td>
<td align="left" valign="middle">1. I pretended that I did not have the knowledge.</td>
<td align="char" valign="middle" char="." rowspan="4">0.956</td>
</tr>
<tr>
<td align="left" valign="middle">2. I said that I did not know, even though I did.</td>
</tr>
<tr>
<td align="left" valign="middle">3. I pretended I did not know what s/he was talking about.</td>
</tr>
<tr>
<td align="left" valign="middle">4. I said that I was not very knowledgeable about the topic.</td>
</tr>
<tr>
<td align="left" valign="middle" rowspan="4">Evasive hiding</td>
<td align="left" valign="middle">1. I agreed to help him/her but never really intended to.</td>
<td align="char" valign="middle" char="." rowspan="4">0.959</td>
</tr>
<tr>
<td align="left" valign="middle">2. I agreed to help him/her but instead gave him/her different information from what she/he wanted.</td>
</tr>
<tr>
<td align="left" valign="middle">3. I told him/her that I would help him/her out later but stalled as much as possible.</td>
</tr>
<tr>
<td align="left" valign="middle">4. I offered him/her some other information instead of what he/she really wanted.</td>
</tr>
<tr>
<td align="left" valign="middle" rowspan="4">Rationalized hiding</td>
<td align="left" valign="middle">1. I explained that I would like to tell him/her, but was not supposed to.</td>
<td align="char" valign="middle" char="." rowspan="4">0.884</td>
</tr>
<tr>
<td align="left" valign="middle">2. I explained that the information is confidential and only available to people on a particular project.</td>
</tr>
<tr>
<td align="left" valign="middle">3. I told him/her that my boss would not let anyone share this knowledge.</td>
</tr>
<tr>
<td align="left" valign="middle">4. I said that I would not answer his/her questions.</td>
</tr>
<tr>
<td align="left" valign="middle" rowspan="11">Procrastination</td>
<td align="left" valign="middle">1. I delay sharing knowledge related to my task until it&#x2019;s too late.</td>
<td align="char" valign="middle" char="." rowspan="11">0.955</td>
</tr>
<tr>
<td align="left" valign="middle">2. Even after I share the knowledge, I delay acting upon it.</td>
</tr>
<tr>
<td align="left" valign="middle">3. I waste a lot of time on trivial matters before sharing the knowledge.</td>
</tr>
<tr>
<td align="left" valign="middle">4. In preparation for some deadlines, I often waste time by doing other things.</td>
</tr>
<tr>
<td align="left" valign="middle">5. Rarely have I been able to convey knowledge to others within a few days.</td>
</tr>
<tr>
<td align="left" valign="middle">6. I often find myself sharing knowledge with people that I had intended to do days before.</td>
</tr>
<tr>
<td align="left" valign="middle">7. I am continually saying &#x201C;I&#x2019;ll share knowledge the next time.&#x201D;</td>
</tr>
<tr>
<td align="left" valign="middle">8. I generally delay before sharing the knowledge I have to.</td>
</tr>
<tr>
<td align="left" valign="middle">9. I find myself running out of time.</td>
</tr>
<tr>
<td align="left" valign="middle">10. I do not tell knowledge done on time.</td>
</tr>
<tr>
<td align="left" valign="middle">11. I do not tell knowledge deadlines.</td>
</tr>
</tbody>
</table>
<table-wrap-foot>
<p>Exploitative leadership&#x2009;=&#x2009;0.937, Psychological distress&#x2009;=&#x2009;0.959, Leader&#x2019;s incivility&#x2009;=&#x2009;0.951, Playing dumb&#x2009;=&#x2009;0.956, Evasive hiding&#x2009;=&#x2009;0.959, Rationalized hiding&#x2009;=&#x2009;0.885, Procrastination&#x2009;=&#x2009;0.955.</p>
</table-wrap-foot>
</table-wrap>
</sec>
<sec id="sec14">
<label>4.5</label>
<title>Descriptive statistics and correlation analysis</title>
<p>Descriptive statistics and Pearson&#x2019;s correlation analyzes were performed using SPSS 26.0 and the results are shown in <xref ref-type="table" rid="tab6">Table 6</xref>. The results of the correlation analysis showed that exploitative leadership was positively related to psychological distress, leader incivility, playing dumb, evasive hiding, rationalized hiding, and procrastination. Additionally, psychological distress was positively related to leaders&#x2019; incivility, playing dumb, evasive hiding, rationalized hiding, and procrastination. Finally, leaders&#x2019; incivility was positively related to playing dumb, evasive hiding, rationalized hiding, and procrastination. Therefore, all correlations between variables were statistically significant.</p>
<table-wrap position="float" id="tab6">
<label>Table 6</label>
<caption>
<p>The results of descriptive statistics and correlation between variables.</p>
</caption>
<table frame="hsides" rules="groups">
<thead>
<tr>
<th/>
<th align="center" valign="top">Mean</th>
<th align="center" valign="top">SD</th>
<th align="center" valign="top">1</th>
<th align="center" valign="top">2</th>
<th align="center" valign="top">3</th>
<th align="center" valign="top">4</th>
<th align="center" valign="top">5</th>
<th align="center" valign="top">6</th>
<th align="center" valign="top">7</th>
</tr>
</thead>
<tbody>
<tr>
<td align="left" valign="middle">1</td>
<td align="char" valign="middle" char=".">3.946</td>
<td align="char" valign="middle" char=".">1.840</td>
<td align="char" valign="middle" char=".">&#x2013;</td>
<td/>
<td/>
<td/>
<td/>
<td/>
<td/>
</tr>
<tr>
<td align="left" valign="middle">2</td>
<td align="char" valign="middle" char=".">3.865</td>
<td align="char" valign="middle" char=".">1.409</td>
<td align="char" valign="middle" char=".">0.349&#x002A;&#x002A;&#x002A;</td>
<td align="char" valign="middle" char=".">&#x2013;</td>
<td/>
<td/>
<td/>
<td/>
<td/>
</tr>
<tr>
<td align="left" valign="middle">3</td>
<td align="char" valign="middle" char=".">3.254</td>
<td align="char" valign="middle" char=".">1.575</td>
<td align="char" valign="middle" char=".">0.546&#x002A;&#x002A;&#x002A;</td>
<td align="char" valign="middle" char=".">0.588&#x002A;&#x002A;&#x002A;</td>
<td align="char" valign="middle" char=".">&#x2013;</td>
<td/>
<td/>
<td/>
<td/>
</tr>
<tr>
<td align="left" valign="middle">4</td>
<td align="char" valign="middle" char=".">4.036</td>
<td align="char" valign="middle" char=".">1.629</td>
<td align="char" valign="middle" char=".">0.348&#x002A;&#x002A;&#x002A;</td>
<td align="char" valign="middle" char=".">0.441&#x002A;&#x002A;&#x002A;</td>
<td align="char" valign="middle" char=".">0.602&#x002A;&#x002A;&#x002A;</td>
<td align="char" valign="middle" char=".">&#x2013;</td>
<td/>
<td/>
<td/>
</tr>
<tr>
<td align="left" valign="middle">5</td>
<td align="char" valign="middle" char=".">3.213</td>
<td align="char" valign="middle" char=".">1.559</td>
<td align="char" valign="middle" char=".">0.358&#x002A;&#x002A;&#x002A;</td>
<td align="char" valign="middle" char=".">0.493&#x002A;&#x002A;&#x002A;</td>
<td align="char" valign="middle" char=".">0.674&#x002A;&#x002A;&#x002A;</td>
<td align="char" valign="middle" char=".">0.608&#x002A;&#x002A;&#x002A;</td>
<td align="char" valign="middle" char=".">&#x2013;</td>
<td/>
<td/>
</tr>
<tr>
<td align="left" valign="middle">6</td>
<td align="char" valign="middle" char=".">4.132</td>
<td align="char" valign="middle" char=".">1.402</td>
<td align="char" valign="middle" char=".">0.238&#x002A;&#x002A;&#x002A;</td>
<td align="char" valign="middle" char=".">0.316&#x002A;&#x002A;&#x002A;</td>
<td align="char" valign="middle" char=".">0.407&#x002A;&#x002A;&#x002A;</td>
<td align="char" valign="middle" char=".">0.566&#x002A;&#x002A;&#x002A;</td>
<td align="char" valign="middle" char=".">0.482&#x002A;&#x002A;&#x002A;</td>
<td align="char" valign="middle" char=".">&#x2013;</td>
<td/>
</tr>
<tr>
<td align="left" valign="middle">7</td>
<td align="char" valign="middle" char=".">3.614</td>
<td align="char" valign="middle" char=".">1.389</td>
<td align="char" valign="middle" char=".">0.332&#x002A;&#x002A;&#x002A;</td>
<td align="char" valign="middle" char=".">0.562&#x002A;&#x002A;&#x002A;</td>
<td align="char" valign="middle" char=".">0.610&#x002A;&#x002A;&#x002A;</td>
<td align="char" valign="middle" char=".">0.596&#x002A;&#x002A;&#x002A;</td>
<td align="char" valign="middle" char=".">0.667&#x002A;&#x002A;&#x002A;</td>
<td align="char" valign="middle" char=".">0.431&#x002A;&#x002A;&#x002A;</td>
<td align="char" valign="middle" char=".">-</td>
</tr>
</tbody>
</table>
<table-wrap-foot>
<p>1&#x2009;=&#x2009;Exploitative Leadership 2&#x2009;=&#x2009;Psychological Distress 3&#x2009;=&#x2009;Leader&#x2019;s Incivility 4&#x2009;=&#x2009;Dumb Playing 5&#x2009;=&#x2009;Evasive Hiding 6&#x2009;=&#x2009;Rationalized Hiding 7&#x2009;=&#x2009;Procrastination. &#x002A;&#x002A;&#x002A;<italic>p</italic>&#x2009;&#x003C;&#x2009;0.001, &#x002A;&#x002A;<italic>p</italic>&#x2009;&#x003C;&#x2009;0.01, &#x002A;<italic>p</italic>&#x2009;&#x003C;&#x2009;0.05.</p>
</table-wrap-foot>
</table-wrap>
</sec>
<sec id="sec15">
<label>4.6</label>
<title>Hypotheses testing</title>
<p>A total of six hypotheses were formulated in this study. We used SPSS PROCESS Macro version 3.4, specifically, Models 3 and 7, to test the hypotheses. The summary of the hypothesis testing results is as follows. Exploitative leadership positively influenced playing dumb (estimate&#x2009;=&#x2009;0.196, <italic>p</italic>&#x2009;&#x003C;&#x2009;0.001, Boot LLCI&#x2009;=&#x2009;0.100, Boot ULCI&#x2009;=&#x2009;0.293), evasive hiding (estimate&#x2009;=&#x2009;0.180, p&#x2009;&#x003C;&#x2009;0.001, Boot LLCI&#x2009;=&#x2009;0.090, Boot ULCI&#x2009;=&#x2009;0.269), rationalized hiding (estimate&#x2009;=&#x2009;0.111, p&#x2009;&#x003C;&#x2009;0.001, Boot LLCI&#x2009;=&#x2009;0.022, Boot ULCI&#x2009;=&#x2009;0.200), and procrastination (estimate&#x2009;=&#x2009;0.117, p&#x2009;&#x003C;&#x2009;0.001, Boot LLCI&#x2009;=&#x2009;0.080, Boot ULCI&#x2009;=&#x2009;0.205). This finding indicated that H1, H1-1, H1-2, H1-3, and H1-4 were supported. In relation to testing the mediating effect of psychological distress, we performed a bootstrapping analysis and used a sample of 5,000. We utilized a 95% CI for the indirect effect of psychological distress.</p>
<p>The results showed that the mediating effect of psychological distress on the relationship between exploitative leadership and playing dumb was 0.112 with Boot 95% CI (0.060, 0.187), evasive hiding was 0.124 with Boot 95% CI(0.073, 0.195), rationalized hiding was 0.071 with Boot 95% CI (0.025, 0.130), and procrastination was 0.134 with Boot 95% CI (0.080, 0.205). Therefore, H2, H3, H4, and H5 were supported. <xref ref-type="table" rid="tab7">Table 7</xref> shows the results of the hypotheses testing for the structured model.</p>
<table-wrap position="float" id="tab7">
<label>Table 7</label>
<caption>
<p>Hypotheses testing for the structured model.</p>
</caption>
<table frame="hsides" rules="groups">
<thead>
<tr>
<th align="left" valign="top" colspan="3">Path</th>
<th align="center" valign="top">Estimate</th>
<th align="center" valign="top">Boot 95% CI</th>
<th align="center" valign="top">
<italic>p</italic>
</th>
</tr>
</thead>
<tbody>
<tr>
<td align="left" valign="middle">Exploitative leadership</td>
<td align="center" valign="middle">&#x2192;</td>
<td align="left" valign="middle">Psychological Distress</td>
<td align="char" valign="middle" char=".">0.267</td>
<td align="char" valign="middle" char="(">(0.183, 0.351)</td>
<td align="char" valign="middle" char=".">&#x002A;&#x002A;&#x002A;</td>
</tr>
<tr>
<td align="left" valign="middle">Psychological distress</td>
<td align="center" valign="middle">&#x2192;</td>
<td align="left" valign="middle">Playing Dumb</td>
<td align="char" valign="middle" char=".">0.420</td>
<td align="char" valign="middle" char="(">(0.294, 0.546)</td>
<td align="char" valign="middle" char=".">&#x002A;&#x002A;&#x002A;</td>
</tr>
<tr>
<td align="left" valign="middle">Exploitative leadership</td>
<td align="center" valign="middle">&#x2192;</td>
<td align="left" valign="middle">Playing Dumb</td>
<td align="char" valign="middle" char=".">0.196</td>
<td align="char" valign="middle" char="(">(0.100, 0.293)</td>
<td align="char" valign="middle" char=".">&#x002A;&#x002A;&#x002A;</td>
</tr>
<tr>
<td align="left" valign="middle">Psychological distress</td>
<td align="center" valign="middle">&#x2192;</td>
<td align="left" valign="middle">Evasive Hiding</td>
<td align="char" valign="middle" char=".">0.464</td>
<td align="char" valign="middle" char="(">(0.348, 0.581)</td>
<td align="char" valign="middle" char=".">&#x002A;&#x002A;&#x002A;</td>
</tr>
<tr>
<td align="left" valign="middle">Exploitative leadership</td>
<td align="center" valign="middle">&#x2192;</td>
<td align="left" valign="middle">Evasive Hiding</td>
<td align="char" valign="middle" char=".">0.180</td>
<td align="char" valign="middle" char="(">(0.090, 0.269)</td>
<td align="char" valign="middle" char=".">&#x002A;&#x002A;&#x002A;</td>
</tr>
<tr>
<td align="left" valign="middle">Psychological distress</td>
<td align="center" valign="middle">&#x2192;</td>
<td align="left" valign="middle">Rationalized Hiding</td>
<td align="char" valign="middle" char=".">0.264</td>
<td align="char" valign="middle" char="(">(0.148, 0.380)</td>
<td align="char" valign="middle" char=".">&#x002A;&#x002A;&#x002A;</td>
</tr>
<tr>
<td align="left" valign="middle">Exploitative leadership</td>
<td align="center" valign="middle">&#x2192;</td>
<td align="left" valign="middle">Rationalized Hiding</td>
<td align="char" valign="middle" char=".">0.111</td>
<td align="char" valign="middle" char="(">(0.022, 0.200)</td>
<td align="char" valign="middle" char=".">&#x002A;&#x002A;&#x002A;</td>
</tr>
<tr>
<td align="left" valign="middle">Psychological distress</td>
<td align="center" valign="middle">&#x2192;</td>
<td align="left" valign="middle">Procrastination</td>
<td align="char" valign="middle" char=".">0.501</td>
<td align="char" valign="middle" char="(">(0.401, 0.601)</td>
<td align="char" valign="middle" char=".">&#x002A;&#x002A;&#x002A;</td>
</tr>
<tr>
<td align="left" valign="middle">Exploitative leadership</td>
<td align="center" valign="middle">&#x2192;</td>
<td align="left" valign="middle">Procrastination</td>
<td align="char" valign="middle" char=".">0.117</td>
<td align="char" valign="middle" char="(">(0.080, 0.205)</td>
<td align="char" valign="middle" char=".">&#x002A;&#x002A;&#x002A;</td>
</tr>
</tbody>
</table>
<table frame="hsides" rules="groups">
<thead>
<tr>
<th align="left" valign="middle">Mediating effect</th>
<th align="center" valign="middle">Indirect effect</th>
<th align="center" valign="middle">Boot 95% CI</th>
<th align="center" valign="middle">Significant</th>
</tr>
</thead>
<tbody>
<tr>
<td align="left" valign="middle">Exploitative Leadership &#x2192; Psychological Distress &#x2192; Playing Dumb</td>
<td align="char" valign="middle" char=".">0.112</td>
<td align="char" valign="middle" char="(">(0.060, 0.187)</td>
<td align="char" valign="middle" char=".">&#x002A;&#x002A;&#x002A;</td>
</tr>
<tr>
<td align="left" valign="middle">Exploitative Leadership &#x2192; Psychological Distress &#x2192; Evasive Hiding</td>
<td align="char" valign="middle" char=".">0.124</td>
<td align="char" valign="middle" char="(">(0.073, 0.195)</td>
<td align="char" valign="middle" char=".">&#x002A;&#x002A;&#x002A;</td>
</tr>
<tr>
<td align="left" valign="middle">Exploitative Leadership &#x2192; Psychological Distress &#x2192; Rationalized Hiding</td>
<td align="char" valign="middle" char=".">0.071</td>
<td align="char" valign="middle" char="(">(0.025, 0.130)</td>
<td align="char" valign="middle" char=".">&#x002A;&#x002A;&#x002A;</td>
</tr>
<tr>
<td align="left" valign="middle">Exploitative Leadership &#x2192; Psychological Distress &#x2192; Procrastination</td>
<td align="char" valign="middle" char=".">0.134</td>
<td align="char" valign="middle" char="(">(0.080, 0.205)</td>
<td align="char" valign="middle" char=".">&#x002A;&#x002A;&#x002A;</td>
</tr>
</tbody>
</table>
<table-wrap-foot>
<p>Hypotheses were tested by using path analysis.</p>
</table-wrap-foot>
</table-wrap>
<p>According to <xref ref-type="bibr" rid="ref36">Hair and Sarstedt (2019)</xref>, partial least squares structural equation modeling (PLS-SEM) is more appropriate than structural equation modeling (SEM) for demonstrating multiple relationships. PLS-SEM was conducted to verify the significance of the mediating effect of psychological distress with both the indirect effect and variance accounted for (VAF) and the results are shown in <xref ref-type="table" rid="tab8">Table 8</xref>. The results showed the indirect effect of psychological distress on the relationship between exploitative leadership and playing dumb (indirect effect&#x2009;=&#x2009;0.112, total effect&#x2009;=&#x2009;0.308, and VAF&#x2009;=&#x2009;36.4%), evasive hiding (indirect effect&#x2009;=&#x2009;0.124, total effect&#x2009;=&#x2009;0.304, and VAF&#x2009;=&#x2009;40.8%), rationalized hiding (indirect effect&#x2009;=&#x2009;0.070, total effect&#x2009;=&#x2009;0.181, and VAF&#x2009;=&#x2009;38.7%), and procrastination (indirect effect&#x2009;=&#x2009;0.134, total effect&#x2009;=&#x2009;0.251, and VAF&#x2009;=&#x2009;53.4%). A VAF below 20% signifies insignificant mediation, a VAF from 20 to 80% signifies partial mediation, and a VAF above 80% is regarded as full mediation, as suggested by <xref ref-type="bibr" rid="ref35">Hair et al. (2014)</xref>. In the current study, VAF was in the range of 20&#x2013;80%. Thus, psychological distress showed partial mediation, and H6, H7, H8, and H9 were significantly supported.</p>
<table-wrap position="float" id="tab8">
<label>Table 8</label>
<caption>
<p>Mediating analysis in PLS-SEM.</p>
</caption>
<table frame="hsides" rules="groups">
<thead>
<tr>
<th align="left" valign="top">Effect</th>
<th align="center" valign="top">Path</th>
<th align="center" valign="top">Path coefficient</th>
<th align="center" valign="top">Indirect effect</th>
<th align="center" valign="top">Total effect</th>
<th align="center" valign="top">VAF</th>
<th align="center" valign="top">
<italic>p</italic>
</th>
</tr>
</thead>
<tbody>
<tr>
<td align="left" valign="middle" rowspan="3">Indirect with mediator</td>
<td align="center" valign="middle">EL&#x2009;&#x2192;&#x2009;PD</td>
<td align="char" valign="middle" char=".">0.196</td>
<td align="char" valign="middle" char=".">&#x2013;</td>
<td align="char" valign="middle" char="." rowspan="3">0.308</td>
<td align="char" valign="middle" char="." rowspan="3">36.4%</td>
<td align="char" valign="middle" char="." rowspan="3">&#x002A;&#x002A;&#x002A;</td>
</tr>
<tr>
<td align="center" valign="middle">EL&#x2009;&#x2192;&#x2009;PDS</td>
<td align="char" valign="middle" char=".">0.267</td>
<td align="char" valign="middle" char="." rowspan="2">0.112</td>
</tr>
<tr>
<td align="center" valign="middle">PDS&#x2009;&#x2192;&#x2009;PD</td>
<td align="char" valign="middle" char=".">0.420</td>
</tr>
<tr>
<td align="left" valign="middle" rowspan="3">Indirect with mediator</td>
<td align="center" valign="middle">EL&#x2009;&#x2192;&#x2009;EH</td>
<td align="char" valign="middle" char=".">0.180</td>
<td align="char" valign="middle" char=".">&#x2013;</td>
<td align="char" valign="middle" char="." rowspan="3">0.304</td>
<td align="char" valign="middle" char="." rowspan="3">40.8%</td>
<td align="char" valign="middle" char="." rowspan="3">&#x002A;&#x002A;&#x002A;</td>
</tr>
<tr>
<td align="center" valign="middle">EL&#x2009;&#x2192;&#x2009;PDS</td>
<td align="char" valign="middle" char=".">0.267</td>
<td align="char" valign="middle" char="." rowspan="2">0.124</td>
</tr>
<tr>
<td align="center" valign="middle">PDS&#x2009;&#x2192;&#x2009;EH</td>
<td align="char" valign="middle" char=".">0.464</td>
</tr>
<tr>
<td align="left" valign="middle" rowspan="3">Indirect with mediator</td>
<td align="center" valign="middle">EL&#x2009;&#x2192;&#x2009;RH</td>
<td align="char" valign="middle" char=".">0.111</td>
<td align="char" valign="middle" char=".">&#x2013;</td>
<td align="char" valign="middle" char="." rowspan="3">0.181</td>
<td align="char" valign="middle" char="." rowspan="3">38.7%</td>
<td align="char" valign="middle" char="." rowspan="3">&#x002A;&#x002A;&#x002A;</td>
</tr>
<tr>
<td align="center" valign="middle">EL&#x2009;&#x2192;&#x2009;PDS</td>
<td align="char" valign="middle" char=".">0.267</td>
<td align="char" valign="middle" char="." rowspan="2">0.070</td>
</tr>
<tr>
<td align="center" valign="middle">PDS&#x2009;&#x2192;&#x2009;RH</td>
<td align="char" valign="middle" char=".">0.264</td>
</tr>
<tr>
<td align="left" valign="middle" rowspan="3">Indirect with mediator</td>
<td align="center" valign="middle">EL&#x2009;&#x2192;&#x2009;PC</td>
<td align="char" valign="middle" char=".">0.117</td>
<td align="char" valign="middle" char=".">&#x2013;</td>
<td align="char" valign="middle" char="." rowspan="3">0.251</td>
<td align="char" valign="middle" char="." rowspan="3">53.4%</td>
<td align="char" valign="middle" char="." rowspan="3">&#x002A;&#x002A;&#x002A;</td>
</tr>
<tr>
<td align="center" valign="middle">EL&#x2009;&#x2192;&#x2009;PDS</td>
<td align="char" valign="middle" char=".">0.267</td>
<td align="char" valign="middle" char="." rowspan="2">0.134</td>
</tr>
<tr>
<td align="center" valign="middle">PDS&#x2009;&#x2192;&#x2009;PC</td>
<td align="char" valign="middle" char=".">0.501</td>
</tr>
</tbody>
</table>
<table-wrap-foot>
<p>EL&#x2009;=&#x2009;Exploitative Leadership, PDS=Psychological Distress&#xFF0C;PD=Playing Dumb, EH&#x2009;=&#x2009;Evasive Hiding, RH&#x2009;=&#x2009;Rationalized Hiding, PC=Procrastination. &#x002A;&#x002A;&#x002A;<italic>p</italic>&#x2009;&#x003C;&#x2009;0.001, &#x002A;&#x002A;<italic>p</italic>&#x2009;&#x003C;&#x2009;0.01, &#x002A;<italic>p</italic>&#x2009;&#x003C;&#x2009;0.05.</p>
</table-wrap-foot>
</table-wrap>
<p>In order to test the moderating effect of leaders&#x2019; incivility, we performed a bootstrapping analysis using a sample size of 5,000 and a 95% CI. The moderating effect of leaders&#x2019; incivility was statistically significant (estimate&#x2009;=&#x2009;0.052, <italic>p</italic>&#x2009;&#x003C;&#x2009;0.05). Moreover, the CI for the moderating effect of leaders&#x2019; incivility on the relationship between exploitative leadership and psychological distress did not include zero (95% CI: [0.011&#x2013;0.094]). Therefore, the moderating effect of leaders&#x2019; incivility was statistically significant, and H6 was supported. <xref ref-type="table" rid="tab9">Table 9</xref> shows the moderating effect of leader incivility.</p>
<table-wrap position="float" id="tab9">
<label>Table 9</label>
<caption>
<p>The moderating effect of leader&#x2019;s incivility.</p>
</caption>
<table frame="hsides" rules="groups">
<thead>
<tr>
<th align="left" valign="top">Variable</th>
<th align="center" valign="top">Estimate</th>
<th align="center" valign="top">SE</th>
<th align="center" valign="top">t</th>
<th align="center" valign="top">
<italic>p</italic>
</th>
<th align="center" valign="top">Boot LLCI</th>
<th align="center" valign="top">Boot ULCI</th>
</tr>
</thead>
<tbody>
<tr>
<td align="left" valign="middle">Exploitative leadership (A)</td>
<td align="char" valign="middle" char=".">&#x2212;0.131</td>
<td align="char" valign="middle" char=".">0.078</td>
<td align="char" valign="middle" char=".">&#x2212;1.676</td>
<td align="char" valign="middle" char=".">0.095</td>
<td align="char" valign="middle" char=".">&#x2212;0.286</td>
<td align="char" valign="middle" char=".">0.023</td>
</tr>
<tr>
<td align="left" valign="middle">Leader&#x2019;s incivility (B)</td>
<td align="char" valign="middle" char=".">0.282</td>
<td align="char" valign="middle" char=".">0.104</td>
<td align="char" valign="middle" char=".">2.710</td>
<td align="char" valign="middle" char=".">0.007</td>
<td align="char" valign="middle" char=".">0.077</td>
<td align="char" valign="middle" char=".">0.487</td>
</tr>
<tr>
<td align="left" valign="middle">Interaction (A x b)</td>
<td align="char" valign="middle" char=".">0.052</td>
<td align="char" valign="middle" char=".">0.021</td>
<td align="char" valign="middle" char=".">2.472</td>
<td align="char" valign="middle" char=".">0.014</td>
<td align="char" valign="middle" char=".">0.011</td>
<td align="char" valign="middle" char=".">0.094</td>
</tr>
</tbody>
</table>
<table-wrap-foot>
<p>The moderating effect of psychological distress.</p>
</table-wrap-foot>
</table-wrap>
<p><xref ref-type="fig" rid="fig2">Figure 2</xref> illustrates the moderating effect of leader incivility. The graph shows that exploitative leaders reported higher levels of psychological distress when subordinates&#x2019; recognition of their leaders&#x2019; incivility increased. By contrast, exploitative leaders reported lower levels of psychological distress when subordinates&#x2019; recognition of leaders&#x2019; incivility was lower.</p>
<fig position="float" id="fig2">
<label>Figure 2</label>
<caption>
<p>The moderating effect of psychological distress. Leader incivility positively moderates the relationship between exploitative leadership and psychological distress.</p>
</caption>
<graphic xlink:href="fpsyg-14-1279964-g002.tif"/>
</fig>
<p>The moderated mediation model was examined using SPSS PROCESS Macro 3.4 version with Model 7 and tested using 95% CI and 5,000 bootstrapping re-samples.</p>
<p>The results showed that moderated mediation effect of leaders&#x2019; incivility on the mediating effect of psychological distress on the relationship between exploitative leadership and playing dumb [index&#x2009;=&#x2009;0.022, 95% CI&#x2009;=&#x2009;(&#x2212;0.002, 0.050)], evasive hiding [index&#x2009;=&#x2009;0.024, 95% CI&#x2009;=&#x2009;(&#x2212;0.004, 0.055)], rationalized hiding [index&#x2009;=&#x2009;0.014, 95% CI&#x2009;=&#x2009;(&#x2212;0.001, 0.037)], and procrastination [index&#x2009;=&#x2009;0.026, 95% CI&#x2009;=&#x2009;(&#x2212;0.004, 0.057)]. These findings indicate that H7, H8, H9, and H10 were rejected. <xref ref-type="table" rid="tab10">Table 10</xref> presents the moderated mediating effect of leader incivility.</p>
<table-wrap position="float" id="tab10">
<label>Table 10</label>
<caption>
<p>The moderated mediation effect of leader&#x2019;s incivility.</p>
</caption>
<table frame="hsides" rules="groups">
<thead>
<tr>
<th align="left" valign="top" colspan="5">Index of moderated mediation</th>
</tr>
</thead>
<tbody>
<tr>
<td align="left" valign="middle">Path (Independent Variable &#x2192; Mediator &#x2192; Dependent Variable)</td>
<td align="left" valign="middle">Moderator</td>
<td align="center" valign="middle">Index</td>
<td align="center" valign="middle">Boot SE</td>
<td align="center" valign="middle">Boot 95% CI</td>
</tr>
<tr>
<td align="left" valign="middle">Exploitative Leadership &#x2192; Psychological Distress &#x2192; Playing Dumb</td>
<td align="left" valign="middle">Leader&#x2019;s incivility</td>
<td align="char" valign="middle" char=".">0.022</td>
<td align="char" valign="middle" char=".">0.014</td>
<td align="char" valign="middle" char="(">(&#x2212;0.002, 0.050)</td>
</tr>
<tr>
<td align="left" valign="middle">Exploitative Leadership &#x2192; Psychological Distress &#x2192; Evasive Hiding</td>
<td align="left" valign="middle">Leader&#x2019;s incivility</td>
<td align="char" valign="middle" char=".">0.024</td>
<td align="char" valign="middle" char=".">0.015</td>
<td align="char" valign="middle" char="(">(&#x2212;0.004, 0.055)</td>
</tr>
<tr>
<td align="left" valign="middle">Exploitative Leadership &#x2192; Psychological Distress &#x2192; Rationalized Hiding</td>
<td align="left" valign="middle">Leader&#x2019;s incivility</td>
<td align="char" valign="middle" char=".">0.014</td>
<td align="char" valign="middle" char=".">0.010</td>
<td align="char" valign="middle" char="(">(&#x2212;0.001, 0.037)</td>
</tr>
<tr>
<td align="left" valign="middle">Exploitative Leadership &#x2192; Psychological Distress &#x2192; Procrastination</td>
<td align="left" valign="middle">Leader&#x2019;s incivility</td>
<td align="char" valign="middle" char=".">0.026</td>
<td align="char" valign="middle" char=".">0.015</td>
<td align="char" valign="middle" char="(">(&#x2212;0.004, 0.057)</td>
</tr>
</tbody>
</table>
<table-wrap-foot>
<p>The moderated mediation effect of leader incivility on the relationship between exploitative leadership and playing dumb, evasive hiding, rationalized hiding, and procrastination.</p>
</table-wrap-foot>
</table-wrap>
</sec>
</sec>
<sec sec-type="discussion" id="sec16">
<label>5</label>
<title>Discussion</title>
<p>This study examined how exploitative leadership influences knowledge-hiding behavior. Specifically, we verified the mediating effect of psychological distress on the relationship between exploitative leadership and knowledge hiding. Furthermore, the moderating effect of leader incivility in the relationship between exploitative leadership and psychological distress was tested. This study contributed to expanding the research scope on exploitative leadership and knowledge hiding. Furthermore, the impact of exploitative leadership on knowledge-hiding behavior was presented through social exchange theory and conservation of resource theory. Existing research is insufficient to verify the causal relationship between exploitative leadership and knowledge hiding. Therefore, this study contributes to filling the gap.</p>
<p>This study is the first to empirically test the four dimensions (playing dumb, evasive hiding, rationalized hiding, and procrastination) of knowledge hiding, contributing to expanding the research dimensions of knowledge-hiding behavior by additionally verifying the subdimensions of knowledge hiding. Furthermore, unlike most previous studies that explored or verified only the antecedents of knowledge hiding and demonstrated only mediating or moderating effects, we verified the process leading to knowledge hiding and the significance of the research model. Finally, while most previous studies have statistically tested knowledge hiding in educational institutions, we emphasized the negative aspects of knowledge hiding among Chinese SMEs&#x2019; employees, contributing to a deeper understanding of the causes and processes that lead to knowledge hiding in diverse industries.</p>
</sec>
<sec id="sec17">
<label>6</label>
<title>Conclusion and implications</title>
<sec id="sec18">
<label>6.1</label>
<title>Conclusion</title>
<p>To extend the understanding of how exploitative leadership leads to knowledge hiding, we emphasized and explained the role of subordinates&#x2019; psychological distress and verified its impact on the relationship between exploitative leadership and knowledge hiding. This study provides new insights into knowledge-hiding behaviors. The main purpose of our research was to explore and determine whether exploitative leadership is the main factor in creating subordinates&#x2019; knowledge hiding in Chinese SEMs. Further, we aimed to expand the dimensions of knowledge hiding. Most previous studies have focused on the three dimensions (playing dumb, evasive hiding, and rationalized hiding) of knowledge hiding, and we added procrastination as presented by <xref ref-type="bibr" rid="ref25">Farooq and Sultana (2021)</xref>.</p>
<p>We revealed a mechanism that transmits the influence of exploitative leadership on knowledge hiding. Exploitative leadership positively influenced knowledge hiding. In addition, psychological distress mediated the relationship between exploitative leadership and knowledge hiding. Furthermore, leader incivility positively moderated the relationship between exploitative leadership and psychological distress. Moreover, we expected leaders&#x2019; incivility to positively moderate the mediating effect of psychological distress on the relationship between exploitative leadership and knowledge hiding. However, the moderated mediation effect of leader incivility was insignificant.</p>
</sec>
<sec id="sec19">
<label>6.2</label>
<title>Theoretical implications</title>
<p>We include several contributions to theory. First, this study explained how exploitative leadership increases knowledge hiding through conservation of resource theory and social exchange theory.</p>
<p>We contribute to the literature on exploitative leadership by identifying its outcome as knowledge hiding. Exploitative leadership is a new concept, that most previous research on focused on the relationship to turnover intention (<xref ref-type="bibr" rid="ref41">Iqbal et al., 2022</xref>), employees&#x2019; proactive customer service performance (<xref ref-type="bibr" rid="ref92">Sun et al., 2023</xref>), organizational cynicism (<xref ref-type="bibr" rid="ref22">Elsaied, 2022</xref>), and innovative behavior (<xref ref-type="bibr" rid="ref99">Wang et al., 2021</xref>, <xref ref-type="bibr" rid="ref97">2023a</xref>) as a reaction to exploitative leadership. However, there is little research examining the human relationship between exploitative leadership and knowledge hiding. Therefore, we verified the outcome of another aspect of exploitative leadership and presented the theories on how it leads to knowledge hiding. In relation to the casual relationship between exploitative leadership and knowledge hiding, we provide conservation of resource theory and social exchange theory. The underlying principle of the conservation of resource theory suggests individuals strive to protect, retain, and foster the resources that they value (<xref ref-type="bibr" rid="ref39">Hobfoll, 2001</xref>; <xref ref-type="bibr" rid="ref101">Westman et al., 2004</xref>; <xref ref-type="bibr" rid="ref3">Akhtar et al., 2022</xref>). Therefore, exploitative leadership makes members feel greatly threatened, which ultimately leads them to hide knowledge. In addition, social exchange theory presents norms of reciprocity, and negative norms of reciprocity promote individuals to return negative treatment in exchange for negative treatment (<xref ref-type="bibr" rid="ref33">Gouldner, 1960</xref>; <xref ref-type="bibr" rid="ref18">Cropanzano and Mitchell, 2005</xref>; <xref ref-type="bibr" rid="ref27">Feng et al., 2022</xref>). Therefore, the poor interpersonal connections are bound to trigger negative correspondence as a reaction to past disagreeable encounters and create knowledge hiding (<xref ref-type="bibr" rid="ref116">Zhao et al., 2016</xref>; <xref ref-type="bibr" rid="ref21">Dodokh, 2020</xref>). According to this, we consider to have filled an important gap in the literature around exploitative leadership and knowledge hiding.</p>
<p>Second, there is little research on how exploitative leadership causes knowledge hiding. In addition, it can be seen that it is important to reveal the process that exploitative leadership causes knowledge hiding and to derive logical aspects. This is regarded as a theoretical gap in the process of how exploitative leadership leads to knowledge hiding. To fill theoretical gaps, this study logically identified the mediating role of psychological distress and verified its influence. In most previous studies, psychological distress had significant mediating role to work engagement (<xref ref-type="bibr" rid="ref6">Anasori et al., 2021</xref>), turnover intention (<xref ref-type="bibr" rid="ref6">Anasori et al., 2021</xref>), safety compliance and safety participation (<xref ref-type="bibr" rid="ref69">Mirza et al., 2022</xref>), and employee creativity (<xref ref-type="bibr" rid="ref82">Raza and Shah, 2023</xref>). In particular, research on the mediating effect that causes knowledge hiding via psychological distress is quite insufficient. Therefore, what is meaningful to this research is that it revealed the mediating effect of psychological distress on the relationship between exploitative leadership and knowledge hiding. Specifically, exploitative leadership aggravates individuals&#x2019; emotional complexity, resulting in high levels of psychological distress (<xref ref-type="bibr" rid="ref26">Fatima and Majeed, 2023</xref>; <xref ref-type="bibr" rid="ref52">Karatepe et al., 2023</xref>). The main reason for this is that if individuals recognize and experience a leader&#x2019;s intimidating behavior, it will drain their cognitive resources, causing a high level of psychological distress via loss of resources (<xref ref-type="bibr" rid="ref67">Mawritz et al., 2014</xref>; <xref ref-type="bibr" rid="ref40">Hobfoll et al., 2018</xref>; <xref ref-type="bibr" rid="ref26">Fatima and Majeed, 2023</xref>). Thus, exploitative leadership positively influences psychological distress. These results are consistent with those of <xref ref-type="bibr" rid="ref34">Guo et al. (2021)</xref>. Psychological distress is induced by a dehumanizing culture, which explains how organizational members try to abstain from further personal resource depletion and psychological distress, eventually leading to knowledge hiding and defensive behavior (<xref ref-type="bibr" rid="ref84">Robinson et al., 2004</xref>).</p>
<p>Third, this study demonstrated the mediating effect of psychological distress. However, rather than simply focusing on the mediating effect, additional logic appears to be needed as to what variable moderates the level of psychological distress. Therefore, this study logically identified the moderating roles of workplace incivility and revealed how it moderates psychological distress through exploitative leadership interaction with workplace incivility. The interaction between exploitative leadership and leaders&#x2019; incivility revealed differences in the level of psychological distress. The results showed that leader incivility had a positive moderating effect on the relationship between exploitative leadership and psychological distress. Leader incivility creates a stressful workplace climate, causing anxiety and insecurity and leading to low levels of psychological safety (<xref ref-type="bibr" rid="ref61">Liu et al., 2016</xref>, <xref ref-type="bibr" rid="ref60">2020</xref>). Leader incivility reduces individuals&#x2019; psychological safety and eventually increases their psychological distress. In addition, the characteristics of exploitative leaders include selfishness, exploitation, discouragement, increased workload, creation of hurdles, and pressurization (<xref ref-type="bibr" rid="ref86">Schmid et al., 2019</xref>; <xref ref-type="bibr" rid="ref56">Kiyani et al., 2021</xref>). All these characteristics are expected to have a strong relationship with psychological distress. Leaders&#x2019; incivility facilitates social exclusion and injustice and negatively impacts mental and physical health. This may eventually create negative psychological effects such as psychological distress (<xref ref-type="bibr" rid="ref12">Caza and Cortina, 2007</xref>). This finding suggests that leader incivility and exploitative leadership are positively related. Therefore, subordinates experience a high level of exploitative leadership, which leads to higher levels of leader incivility. In addition, the stronger the leader&#x2019;s incivility, the greater the subordinates&#x2019; perceptions of exploitative leadership. Therefore, the interaction between exploitative leadership and leaders&#x2019; incivility leads to higher levels of psychological distress.</p>
<p>Finally, this research is an attempt to bridge exploitative leadership and knowledge hiding and is the first empirical study to expand the dimensions of knowledge-hiding behavior of playing dumb, evasive hiding, rationalized hiding, and procrastination. Knowledge hiding is a type of individual behavior in which individuals intentionally hide useful knowledge or fail to provide substantive knowledge or information to colleagues when requested to do so (<xref ref-type="bibr" rid="ref1011">Serenko and Bontis, 2016</xref>; <xref ref-type="bibr" rid="ref13">Chaker et al., 2021</xref>). This study divided knowledge hiding into four dimensions (playing dumb, evasive hiding, rationalized hiding, and procrastination) and verified how they interact. The results proved that these four dimensions exist independently. Individuals react to various actions in order to hide their knowledge. In particular, the behavior of deliberately providing incorrect information about knowledge, providing justifications to knowledge seekers, pretending not to understand the knowledge, and deliberately delaying and not revealing the knowledge. In addition to playing dumb, evasive hiding, and rationalized hiding, we suggest that procrastination is a type of knowledge hiding.</p>
</sec>
<sec id="sec20">
<label>6.3</label>
<title>Managerial implications</title>
<p>From a practical perspective, the most salient result of our research is the main role of exploitative leadership in shaping perceptions of knowledge hiding and we present managerial implications for SEMs and leaders.</p>
<p>First, as individual resources become more scarce organizations and the value becomes more useful.</p>
<p>This phenomenon can strengthen members&#x2019; sense of protection for their own resources and lead to knowledge hiding. We implicate that knowledge hiding is influenced by exploitative leadership.</p>
<p>Since small and medium-sized enterprises value knowledge utilization, knowledge-hiding behavior is a main negative variable that ultimately causes organizational sustainability and development. Therefore, the role and behavior of leaders in an organization must be periodically monitored. In particular, leaders and members should be officially informed of the dangers of exploitative behavior. In addition, exploitative leadership is positively related to organizational commitment, suggesting that subordinates recognize their leader as exploitative and are more likely to create a cynical attitude toward their organizations (<xref ref-type="bibr" rid="ref22">Elsaied, 2022</xref>). Therefore, organizations should conduct education on the negative consequences that can occur due to exploitation will be needed. The important expectation is to create a culture that emphasizes organizational ethics and the leader&#x2019;s ethical behavior. Furthermore, organizations should closely monitor the quality of leader - member exchange.</p>
<p>Second, because leader&#x2019;s roles are important to individual attitude and organizational performance. It indicates that organizations should pay more attention to investigating the leadership style of candidates when organizations select leaders (<xref ref-type="bibr" rid="ref86">Schmid et al., 2019</xref>). Leaders possess power, and thus the possibility of abusing that power. Hence, it is worth determining whether a leader focuses only on excessive self-interest. Furthermore, candidates who are excessively selfish or only care about their own interests are undesirable leaders and should be evaluated carefully (<xref ref-type="bibr" rid="ref51">Judge and LePine, 2007</xref>).</p>
<p>Third, Organizations should establish and provide training systems in order to convey both appropriate values and guidelines to leaders. Moreover, Organizations should build proactive feedback systems for leadership and also identify exploitative leaders by using 360-degree detection (<xref ref-type="bibr" rid="ref63">Lyu et al., 2023</xref>). This can be considered as an important measure to prevent exploitative behavior. By implementing such a system, education, and training, negative problems such as leader incivility, abusive supervision, and exploitative behavior within the organization can be reduced.</p>
<p>Fourth, we emphasize that a high level of knowledge hiding may decrease team performance, innovative behavior, and organizational innovation. Conversely, although knowledge-sharing behaviors among organizational members add value to organizations, they become reluctant, unwilling, and even dispassionate about sharing their knowledge with coworkers (<xref ref-type="bibr" rid="ref16">Connelly et al., 2012</xref>; <xref ref-type="bibr" rid="ref15">Connelly and Zweig, 2015</xref>; <xref ref-type="bibr" rid="ref31">Ghani et al., 2020</xref>). We predict that voluntary knowledge sharing will be beneficial to organizations and that compulsory knowledge sharing may lead to negative outcomes. Therefore, organizations should make employees aware of the importance of teamwork. Teamwork is in groups with a stronger culture of collectivism than individualism. In particular, Chinese organizational culture has a strong tendency to prefer collectivism. Therefore, it is important for leaders and organizations in small and medium-sized businesses to support their employee&#x2019;s growth. In addition, leaders should share their knowledge with subordinates. It is likely to form an organizational sharing culture over time. This allows employees to freely share their knowledge, thereby reducing knowledge-hiding behavior.</p>
<p>Finally, our findings suggest that unethical leadership is positively associated with psychological distress, which subsequently positively influences knowledge hiding (<xref ref-type="bibr" rid="ref81">Qin et al., 2021</xref>). Specifically, a high level of job complexity is required to mitigate the influence of unethical leadership on psychological distress, which, in turn, decreases knowledge hiding (<xref ref-type="bibr" rid="ref81">Qin et al., 2021</xref>). In addition, exploitative leadership is unethical to subordinates because such leaders are solely self-centered and exploit subordinates&#x2019; limited resources such as energy and time (<xref ref-type="bibr" rid="ref98">Wang et al., 2023b</xref>). Overall, psychological distress is a core element of knowledge hiding. The key factor that can lead to knowledge hiding is psychological distress. Psychological distress is particularly closely related to working conditions and working environment. In particular, employees may experience psychological distress depending on the leader&#x2019;s management style, behavior, and roles. Additionally, overtime working hours and excessive workload are both key variables that can increase employees&#x2019; psychological distress. In order to reduce employees&#x2019; psychological distress, organizations should pay more attention to employees&#x2019; psychological well-being. It will be necessary to check employees&#x2019; needs and opinions. In addition, it is important to identify employees&#x2019; dissatisfaction and satisfaction elements and manage them in an appropriate manner. Furthermore, organizations should provide opportunities for employees to recognize their value within the organization and to induce internal motivation by providing their work with meaning. This management style is expected to reduce psychological distress and ultimately contribute to organizational performance.</p>
</sec>
<sec id="sec21">
<label>6.4</label>
<title>Limitations and future research</title>
<p>Despite these implications, this study has several limitations and directions for future research.</p>
<p>First, the elements that lead to knowledge hiding can be explored from various perspectives. However, this study focuses only on exploitative leadership. We considered two main causes of knowledge hiding involving both interpersonal and organizational aspects. Regarding interpersonal aspects, knowledge-hiding behavior is a strategy among talented organizational members in international SMEs used to continually maintain their own self-efficacy and/or maximize their own control of strategic knowledge (<xref ref-type="bibr" rid="ref106">Xiong et al., 2019</xref>; <xref ref-type="bibr" rid="ref44">Jafari-Sadeghi et al., 2022</xref>). Additionally, it is worth considering organizational factors. We argue that leadership, organizational climate, and organizational culture induce knowledge hiding. Therefore, future research should verify the relationship between the aforementioned elements and knowledge hiding.</p>
<p>Second, emerging studies suggest that knowledge-hiding behavior is not simply the opposite of knowledge sharing, and it is crucial to explore both the progress of research and the development trends of knowledge hiding (<xref ref-type="bibr" rid="ref104">Xia et al., 2022</xref>). Therefore, this study verified the effect of exploitative leadership on knowledge hiding via psychological distress. We only focused on the mediating effects of psychological distress. In this regard, we recommend that future research explore the serial multiple mediation model that causes knowledge hiding and perform more in-depth research.</p>
<p>Third, leader incivility moderates the mediating effect of psychological distress on the relationship between exploitative leadership and knowledge hiding. However, the moderated mediation effect of leader incivility was not significant. Correlation analysis showed that leader incivility was positively related to exploitative leadership, psychological distress, playing dumb, evasive hiding, rationalized hiding, and procrastination. In addition, the moderating effect of leader incivility on the relationship between exploitative leadership and psychological distress was statistically significant. Based on these results, we suggest verifying the significance of the moderated mediation effect of leader incivility by performing a comparative analysis of different types of organizations.</p>
<p>Fourth, organizational phenomena are rarely influenced by a single antecedent in isolation; knowledge-hiding behavior is difficult to predict via its complexity-different antecedent variables, and complex interactions are expected to drive knowledge-hiding in organizations (<xref ref-type="bibr" rid="ref70">Moh&#x2019;d et al., 2021</xref>). Future research should focus on both organizational and supervisory aspects to explore the antecedent variables and demonstrate the complex interactions of various moderating effects.</p>
<p>Finally, while our research sheds various meaningful insights into the issues leading to knowledge hiding, the cross-sectional nature of our data is regarded as tenuous when making inferences and conclusions. We emphasize that perceptions of exploitative leadership, leader incivility, and psychological distress can change over time. This eventually leads to changes in knowledge hiding. Therefore, we proposed a longitudinal study to measure these variables and describe any changes over time.</p>
</sec>
</sec>
<sec sec-type="data-availability" id="sec22">
<title>Data availability statement</title>
<p>The raw data supporting the conclusions of this article will be made available by the authors, without undue reservation.</p>
</sec>
<sec sec-type="ethics-statement" id="sec23">
<title>Ethics statement</title>
<p>The studies involving humans were approved by Gachon university in Republic of Korea. The studies were conducted in accordance with the local legislation and institutional requirements. The participants provided their written informed consent to participate in this study. Written informed consent was obtained from the individual(s) for the publication of any potentially identifiable images or data included in this article.</p>
</sec>
<sec sec-type="author-contributions" id="sec24">
<title>Author contributions</title>
<p>XJ: Data curation, Methodology, Writing &#x2013; original draft. SJ: Conceptualization, Formal analysis, Writing &#x2013; review &#x0026; editing. CQ: Conceptualization, Writing &#x2013; review &#x0026; editing.</p>
</sec>
</body>
<back>
<sec sec-type="funding-information" id="sec25">
<title>Funding</title>
<p>The author(s) declare that no financial support was received for the research, authorship, and/or publication of this article.</p>
</sec>
<sec sec-type="COI-statement" id="sec26">
<title>Conflict of interest</title>
<p>The authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.</p>
</sec>
<sec id="sec100" sec-type="disclaimer">
<title>Publisher&#x2019;s note</title>
<p>All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article, or claim that may be made by its manufacturer, is not guaranteed or endorsed by the publisher.</p>
</sec>
<ref-list>
<title>References</title>
<ref id="ref1">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Abdulmuhsin</surname> <given-names>A. A.</given-names></name> <name><surname>Zaker</surname> <given-names>R. A.</given-names></name> <name><surname>Asad</surname> <given-names>M. M.</given-names></name></person-group> (<year>2021</year>). <article-title>How exploitative leadership influences on knowledge management processes: the moderating role of organisational citizenship behaviour</article-title>. <source>Int. J. Organ. Anal.</source> <volume>29</volume>, <fpage>529</fpage>&#x2013;<lpage>561</lpage>. doi: <pub-id pub-id-type="doi">10.1108/IJOA-09-2020-2424</pub-id></citation>
</ref>
<ref id="ref2">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Akhlaghimofrad</surname> <given-names>A.</given-names></name> <name><surname>Farmanesh</surname> <given-names>P.</given-names></name></person-group> (<year>2021</year>). <article-title>The association between interpersonal conflict, turnover intention and knowledge hiding: the mediating role of employee cynicism and moderating role of emotional intelligence</article-title>. <source>Manage. Sci. Lett.</source> <volume>11</volume>, <fpage>2081</fpage>&#x2013;<lpage>2090</lpage>. doi: <pub-id pub-id-type="doi">10.5267/j.msl.2021.3.001</pub-id></citation>
</ref>
<ref id="ref3">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Akhtar</surname> <given-names>M. W.</given-names></name> <name><surname>Huo</surname> <given-names>C.</given-names></name> <name><surname>Syed</surname> <given-names>F.</given-names></name> <name><surname>Safdar</surname> <given-names>M. A.</given-names></name> <name><surname>Rasool</surname> <given-names>A.</given-names></name> <name><surname>Husnain</surname> <given-names>M.</given-names></name> <etal/></person-group>. (<year>2022</year>). <article-title>Carrot and stick approach: the exploitative leadership and absenteeism in education sector</article-title>. <source>Front. Psychol.</source> <volume>13</volume>:<fpage>890064</fpage>. doi: <pub-id pub-id-type="doi">10.3389/fpsyg.2022.890064</pub-id>, PMID: <pub-id pub-id-type="pmid">35936337</pub-id></citation>
</ref>
<ref id="ref4">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Ali</surname> <given-names>M.</given-names></name> <name><surname>Ali</surname> <given-names>I.</given-names></name> <name><surname>Albort-Morant</surname> <given-names>G.</given-names></name> <name><surname>Leal-Rodr&#x00ED;guez</surname> <given-names>A. L.</given-names></name></person-group> (<year>2021</year>). <article-title>How do job insecurity and perceived well-being affect expatriate employees&#x2019; willingness to share or hide knowledge?</article-title> <source>Int. Entrep. Manag. J.</source> <volume>17</volume>, <fpage>185</fpage>&#x2013;<lpage>210</lpage>. doi: <pub-id pub-id-type="doi">10.1007/s11365-020-00638-1</pub-id></citation>
</ref>
<ref id="ref5">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Amjad</surname> <given-names>S.</given-names></name> <name><surname>Shahbaz</surname> <given-names>K.</given-names></name> <name><surname>Yousaf</surname> <given-names>A.</given-names></name> <name><surname>Ijaz</surname> <given-names>A.</given-names></name> <name><surname>Rehman</surname> <given-names>F.</given-names></name> <name><surname>Farooq</surname> <given-names>J.</given-names></name> <etal/></person-group>. (<year>2020</year>). <article-title>Relationship of internet addiction with psychological distress and emotional intelligence among university students</article-title>. <source>J. Public Value Adm. Insight</source> <volume>3</volume>, <fpage>29</fpage>&#x2013;<lpage>39</lpage>. doi: <pub-id pub-id-type="doi">10.31580/jpvai.v3i2.1447</pub-id></citation>
</ref>
<ref id="ref6">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Anasori</surname> <given-names>E.</given-names></name> <name><surname>Bayighomog</surname> <given-names>S. W.</given-names></name> <name><surname>De Vita</surname> <given-names>G.</given-names></name> <name><surname>Altinay</surname> <given-names>L.</given-names></name></person-group> (<year>2021</year>). <article-title>The mediating role of psychological distress between ostracism, work engagement, and turnover intentions: an analysis in the Cypriot hospitality context</article-title>. <source>Int. J. Hosp. Manag.</source> <volume>94</volume>:<fpage>102829</fpage>. doi: <pub-id pub-id-type="doi">10.1016/j.ijhm.2020.102829</pub-id></citation>
</ref>
<ref id="ref7">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Babic</surname> <given-names>K.</given-names></name> <name><surname>Cerne</surname> <given-names>M.</given-names></name> <name><surname>Skerlavaj</surname> <given-names>M.</given-names></name> <name><surname>Zhang</surname> <given-names>P.</given-names></name></person-group> (<year>2018</year>). <article-title>The interplay among prosocial motivation, cultural tightness, and uncertainty avoidance in predicting knowledge hiding</article-title>. <source>Econ. Bus. Rev.</source> <volume>20</volume>, <fpage>395</fpage>&#x2013;<lpage>422</lpage>. doi: <pub-id pub-id-type="doi">10.15458/85451.71</pub-id></citation>
</ref>
<ref id="ref8">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Basaad</surname> <given-names>S.</given-names></name> <name><surname>Bajaba</surname> <given-names>S.</given-names></name> <name><surname>Basahal</surname> <given-names>A.</given-names></name></person-group> (<year>2023</year>). <article-title>Uncovering the dark side of leadership: how exploitative leaders fuel unethical pro-organizational behavior through moral disengagement</article-title>. <source>Cogent Bus. Manage.</source> <volume>10</volume>:<fpage>2233775</fpage>. doi: <pub-id pub-id-type="doi">10.1080/23311975.2023.2233775</pub-id></citation>
</ref>
<ref id="ref9">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Bhatti</surname> <given-names>S. H.</given-names></name> <name><surname>Hussain</surname> <given-names>M.</given-names></name> <name><surname>Santoro</surname> <given-names>G.</given-names></name> <name><surname>Culasso</surname> <given-names>F.</given-names></name></person-group> (<year>2023</year>). <article-title>The impact of organizational ostracism on knowledge hiding: analysing the sequential mediating role of efficacy needs and psychological distress</article-title>. <source>J. Knowl. Manag.</source> <volume>27</volume>, <fpage>485</fpage>&#x2013;<lpage>505</lpage>. doi: <pub-id pub-id-type="doi">10.1108/JKM-03-2021-0223</pub-id></citation>
</ref>
<ref id="ref10">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Blau</surname> <given-names>P. M.</given-names></name>
</person-group> (<year>1964</year>). <source>Social exchange theory</source>. <publisher-loc>Iowa</publisher-loc>: <publisher-name>IOWA State University</publisher-name>.</citation>
</ref>
<ref id="ref11">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Byrne</surname> <given-names>A.</given-names></name> <name><surname>Dionisi</surname> <given-names>A. M.</given-names></name> <name><surname>Barling</surname> <given-names>J.</given-names></name> <name><surname>Akers</surname> <given-names>A.</given-names></name> <name><surname>Roberston</surname> <given-names>J.</given-names></name> <name><surname>Lys</surname> <given-names>R.</given-names></name> <etal/></person-group>. (<year>2014</year>). <article-title>The depleted leader: the influence of leaders&#x2019; diminished psychological resources on leadership behaviors</article-title>. <source>Leadersh. Q.</source> <volume>25</volume>, <fpage>344</fpage>&#x2013;<lpage>357</lpage>. doi: <pub-id pub-id-type="doi">10.1016/j.leaqua.2013.09.003</pub-id></citation>
</ref>
<ref id="ref12">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Caza</surname> <given-names>B. B.</given-names></name> <name><surname>Cortina</surname> <given-names>L. M.</given-names></name></person-group> (<year>2007</year>). <article-title>From insult to injury: explaining the impact of incivility</article-title>. <source>Basic Appl. Soc. Psychol.</source> <volume>29</volume>, <fpage>335</fpage>&#x2013;<lpage>350</lpage>. doi: <pub-id pub-id-type="doi">10.1080/01973530701665108</pub-id></citation>
</ref>
<ref id="ref13">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Chaker</surname> <given-names>N. N.</given-names></name> <name><surname>Nowlin</surname> <given-names>E. L.</given-names></name> <name><surname>Walker</surname> <given-names>D.</given-names></name> <name><surname>Anaza</surname> <given-names>N. A.</given-names></name></person-group> (<year>2021</year>). <article-title>Defending the frontier: examining the impact of internal salesperson evasive knowledge hiding on perceptions of external customer outcomes</article-title>. <source>Eur. J. Mark.</source> <volume>55</volume>, <fpage>671</fpage>&#x2013;<lpage>699</lpage>. doi: <pub-id pub-id-type="doi">10.1108/EJM-02-2019-0174</pub-id></citation>
</ref>
<ref id="ref14">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Comrey</surname> <given-names>A. L.</given-names></name> <name><surname>Lee</surname> <given-names>H. B.</given-names></name></person-group> (<year>1992</year>). &#x201C;<article-title>Interpretation and application of factor analytic results</article-title>&#x201D; in <source>A first course in factor analysis, 2</source>. eds. <person-group person-group-type="editor"><name><surname>Comrey</surname> <given-names>A. L.</given-names></name> <name><surname>Lee</surname> <given-names>H. B.</given-names></name></person-group> (<publisher-loc>Hillsdale, NJ</publisher-loc>: <publisher-name>Lawrence Eribaum Associates</publisher-name>)</citation>
</ref>
<ref id="ref15">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Connelly</surname> <given-names>C. E.</given-names></name> <name><surname>Zweig</surname> <given-names>D.</given-names></name></person-group> (<year>2015</year>). <article-title>How perpetrators and targets construe knowledge hiding in organizations</article-title>. <source>Eur. J. Work Organ. Psy.</source> <volume>24</volume>, <fpage>479</fpage>&#x2013;<lpage>489</lpage>. doi: <pub-id pub-id-type="doi">10.1080/1359432X.2014.931325</pub-id></citation>
</ref>
<ref id="ref16">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Connelly</surname> <given-names>C. E.</given-names></name> <name><surname>Zweig</surname> <given-names>D.</given-names></name> <name><surname>Webster</surname> <given-names>J.</given-names></name> <name><surname>Trougakos</surname> <given-names>J. P.</given-names></name></person-group> (<year>2012</year>). <article-title>Knowledge hiding in organizations</article-title>. <source>J. Organ. Behav.</source> <volume>33</volume>, <fpage>64</fpage>&#x2013;<lpage>88</lpage>. doi: <pub-id pub-id-type="doi">10.1002/job.737</pub-id></citation>
</ref>
<ref id="ref17">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Cortina</surname> <given-names>L. M.</given-names></name> <name><surname>Magley</surname> <given-names>V. J.</given-names></name> <name><surname>Williams</surname> <given-names>J. H.</given-names></name> <name><surname>Langhout</surname> <given-names>R. D.</given-names></name></person-group> (<year>2001</year>). <article-title>Incivility in the workplace: incidence and impact</article-title>. <source>J. Occup. Health Psychol.</source> <volume>6</volume>, <fpage>64</fpage>&#x2013;<lpage>80</lpage>. doi: <pub-id pub-id-type="doi">10.1037/1076-8998.6.1.64</pub-id>, PMID: <pub-id pub-id-type="pmid">11199258</pub-id></citation>
</ref>
<ref id="ref18">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Cropanzano</surname> <given-names>R.</given-names></name> <name><surname>Mitchell</surname> <given-names>M. S.</given-names></name></person-group> (<year>2005</year>). <article-title>Social exchange theory: an interdisciplinary review</article-title>. <source>J. Manag.</source> <volume>31</volume>, <fpage>874</fpage>&#x2013;<lpage>900</lpage>. doi: <pub-id pub-id-type="doi">10.1177/0149206305279602</pub-id></citation>
</ref>
<ref id="ref19">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Davis</surname> <given-names>S.</given-names></name> <name><surname>Botkin</surname> <given-names>J.</given-names></name></person-group> (<year>1994</year>). <article-title>The coming of knowledge-based business</article-title>. <source>Harv. Bus. Rev.</source> <volume>72</volume>, <fpage>165</fpage>&#x2013;<lpage>170</lpage>.</citation>
</ref>
<ref id="ref20">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Demirkasimoglu</surname> <given-names>N.</given-names></name>
</person-group> (<year>2016</year>). <article-title>Knowledge hiding in academia: is personality a key factor?</article-title> <source>Int. J. High. Educ.</source> <volume>5</volume>, <fpage>128</fpage>&#x2013;<lpage>140</lpage>.</citation>
</ref>
<ref id="ref21">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Dodokh</surname> <given-names>A.</given-names></name>
</person-group> (<year>2020</year>). <article-title>Impact of human resources management practices on workplace knowledge-hiding behaviour</article-title>. <source>Int. J. Knowl. Manage. Stud.</source> <volume>11</volume>, <fpage>298</fpage>&#x2013;<lpage>324</lpage>. doi: <pub-id pub-id-type="doi">10.1504/IJKMS.2020.109093</pub-id></citation>
</ref>
<ref id="ref22">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Elsaied</surname> <given-names>M.</given-names></name>
</person-group> (<year>2022</year>). <article-title>Exploitative leadership and organizational cynicism: the mediating role of emotional exhaustion</article-title>. <source>Leadersh. Organ. Dev. J.</source> <volume>43</volume>, <fpage>25</fpage>&#x2013;<lpage>38</lpage>. doi: <pub-id pub-id-type="doi">10.1108/LODJ-02-2021-0069</pub-id></citation>
</ref>
<ref id="ref23">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Escart&#x00ED;n</surname> <given-names>J.</given-names></name> <name><surname>Salin</surname> <given-names>D.</given-names></name> <name><surname>Rodr&#x00ED;guez-Carballeira</surname> <given-names>&#x00C1;.</given-names></name></person-group> (<year>2011</year>). <article-title>Conceptualizations of workplace bullying</article-title>. <source>J. Pers. Psychol.</source> <volume>10</volume>, <fpage>157</fpage>&#x2013;<lpage>165</lpage>. doi: <pub-id pub-id-type="doi">10.1027/1866-5888/a000048</pub-id></citation>
</ref>
<ref id="ref24">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Escartin</surname> <given-names>J.</given-names></name> <name><surname>Zapf</surname> <given-names>D.</given-names></name> <name><surname>Arrieta</surname> <given-names>C.</given-names></name> <name><surname>Rodriguez-Carballeira</surname> <given-names>A.</given-names></name></person-group> (<year>2011</year>). <article-title>Workers&#x2019; perception of workplace bullying: a cross-cultural study</article-title>. <source>Eur. J. Work Organ. Psy.</source> <volume>20</volume>, <fpage>178</fpage>&#x2013;<lpage>205</lpage>. doi: <pub-id pub-id-type="doi">10.1080/13594320903395652</pub-id></citation>
</ref>
<ref id="ref25">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Farooq</surname> <given-names>R.</given-names></name> <name><surname>Sultana</surname> <given-names>A.</given-names></name></person-group> (<year>2021</year>). <article-title>Abusive supervision and its relationship with knowledge hiding: the mediating role of distrust</article-title>. <source>Int. J. Innov. Sci.</source> <volume>13</volume>, <fpage>709</fpage>&#x2013;<lpage>731</lpage>. doi: <pub-id pub-id-type="doi">10.1108/IJIS-08-2020-0121</pub-id></citation>
</ref>
<ref id="ref26">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Fatima</surname> <given-names>T.</given-names></name> <name><surname>Majeed</surname> <given-names>M.</given-names></name></person-group> (<year>2023</year>). <article-title>Detriments of exploitative leadership in the hotel industry: role of conspiracy beliefs and forgiveness climate</article-title>. <source>Int. J. Contemp. Hosp. Manag.</source> <volume>35</volume>, <fpage>2624</fpage>&#x2013;<lpage>2644</lpage>. doi: <pub-id pub-id-type="doi">10.1108/IJCHM-12-2021-1519</pub-id></citation>
</ref>
<ref id="ref27">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Feng</surname> <given-names>Y.</given-names></name> <name><surname>Ayub</surname> <given-names>A.</given-names></name> <name><surname>Fatima</surname> <given-names>T.</given-names></name> <name><surname>Irfan</surname> <given-names>S.</given-names></name> <name><surname>Sarmad</surname> <given-names>M.</given-names></name></person-group> (<year>2022</year>). <article-title>I cannot be creative due to my exploitative leader! A moderated mediation interplay of leader&#x2013;member exchange quality and knowledge hiding</article-title>. <source>J. Organ. Chang. Manag.</source> <volume>35</volume>, <fpage>558</fpage>&#x2013;<lpage>579</lpage>. doi: <pub-id pub-id-type="doi">10.1108/JOCM-04-2021-0127</pub-id></citation>
</ref>
<ref id="ref28">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Garcia</surname> <given-names>P. R. J. M.</given-names></name> <name><surname>Bordia</surname> <given-names>P.</given-names></name> <name><surname>Restubog</surname> <given-names>S. L. D.</given-names></name> <name><surname>Caines</surname> <given-names>V.</given-names></name></person-group> (<year>2018</year>). <article-title>Sleeping with a broken promise: the moderating role of generativity concerns in the relationship between psychological contract breach and insomnia among older workers</article-title>. <source>J. Organ. Behav.</source> <volume>39</volume>, <fpage>326</fpage>&#x2013;<lpage>338</lpage>. doi: <pub-id pub-id-type="doi">10.1002/job.2222</pub-id></citation>
</ref>
<ref id="ref29">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Garcia</surname> <given-names>P. R. J. M.</given-names></name> <name><surname>Ng</surname> <given-names>C. S.</given-names></name> <name><surname>Capezio</surname> <given-names>A.</given-names></name> <name><surname>Restubog</surname> <given-names>S. L. D.</given-names></name> <name><surname>Tang</surname> <given-names>R. L.</given-names></name></person-group> (<year>2017</year>). <article-title>Distressed and drained: consequences of intimate partner aggression and the buffering role of supervisor support</article-title>. <source>J. Vocat. Behav.</source> <volume>103</volume>, <fpage>106</fpage>&#x2013;<lpage>116</lpage>. doi: <pub-id pub-id-type="doi">10.1016/j.jvb.2017.09.003</pub-id></citation>
</ref>
<ref id="ref30">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Ghanbari</surname> <given-names>S.</given-names></name> <name><surname>Majooni</surname> <given-names>H.</given-names></name></person-group> (<year>2022</year>). <article-title>Investigating the relationship between exploitative leadership and knowledge hiding through the mediating role of psychological distress</article-title>. <source>J. Mod. Psychol. Res.</source> <volume>17</volume>, <fpage>239</fpage>&#x2013;<lpage>249</lpage>. doi: <pub-id pub-id-type="doi">10.22108/JAS.2022.133935.2297</pub-id></citation>
</ref>
<ref id="ref31">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Ghani</surname> <given-names>U.</given-names></name> <name><surname>Teo</surname> <given-names>T.</given-names></name> <name><surname>Li</surname> <given-names>Y.</given-names></name> <name><surname>Usman</surname> <given-names>M.</given-names></name> <name><surname>Islam</surname> <given-names>Z. U.</given-names></name> <name><surname>Gul</surname> <given-names>H.</given-names></name> <etal/></person-group>. (<year>2020</year>). <article-title>Tit for tat: abusive supervision and knowledge hiding-the role of psychological contract breach and psychological ownership</article-title>. <source>Int. J. Environ. Res. Public Health</source> <volume>17</volume>:<fpage>1240</fpage>. doi: <pub-id pub-id-type="doi">10.3390/ijerph17041240</pub-id>, PMID: <pub-id pub-id-type="pmid">32075163</pub-id></citation>
</ref>
<ref id="ref32">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Glicken</surname> <given-names>M. D.</given-names></name> <name><surname>Robinson</surname> <given-names>B.</given-names></name></person-group> (<year>2013</year>). <source>Treating worker dissatisfaction during economic change</source>. <publisher-loc>Cambridge, MA</publisher-loc>: <publisher-name>Academic Press</publisher-name>.</citation>
</ref>
<ref id="ref33">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Gouldner</surname> <given-names>A. W.</given-names></name>
</person-group> (<year>1960</year>). <article-title>The norm of reciprocity: a preliminary statement</article-title>. <source>Am. Sociol. Rev.</source> <volume>25</volume>, <fpage>161</fpage>&#x2013;<lpage>178</lpage>. doi: <pub-id pub-id-type="doi">10.2307/2092623</pub-id></citation>
</ref>
<ref id="ref34">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Guo</surname> <given-names>L.</given-names></name> <name><surname>Cheng</surname> <given-names>K.</given-names></name> <name><surname>Luo</surname> <given-names>J.</given-names></name></person-group> (<year>2021</year>). <article-title>The effect of exploitative leadership on knowledge hiding: a conservation of resources perspective</article-title>. <source>Leadersh. Organ. Dev. J.</source> <volume>42</volume>, <fpage>83</fpage>&#x2013;<lpage>98</lpage>. doi: <pub-id pub-id-type="doi">10.1108/LODJ-03-2020-0085</pub-id></citation>
</ref>
<ref id="ref35">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Hair</surname> <given-names>J. F.</given-names></name> <name><surname>Hult</surname> <given-names>G. T. M.</given-names></name> <name><surname>Ringle</surname> <given-names>C.</given-names></name> <name><surname>Sarstedt</surname> <given-names>M.</given-names></name></person-group> (<year>2014</year>). <source>A primer on partial least squares structural equation modeling (PLS-SEM)</source>. <publisher-loc>Thousand Oaks, CA</publisher-loc>: <publisher-name>Sage Publications</publisher-name>.</citation>
</ref>
<ref id="ref36">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Hair</surname> <given-names>J. F.</given-names></name> <name><surname>Sarstedt</surname> <given-names>M.</given-names></name></person-group> (<year>2019</year>). <article-title>Factors versus composites: guidelines for choosing the right structural equation modeling method</article-title>. <source>Proj. Manag. J.</source> <volume>50</volume>, <fpage>619</fpage>&#x2013;<lpage>624</lpage>. doi: <pub-id pub-id-type="doi">10.1177/8756972819882132</pub-id></citation>
</ref>
<ref id="ref37">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Hameed</surname> <given-names>I.</given-names></name> <name><surname>Ul-Durar</surname> <given-names>S.</given-names></name> <name><surname>Arain</surname> <given-names>G. A.</given-names></name></person-group> (<year>2023</year>). &#x201C;<article-title>Understanding knowledge-hiding and its role in intersectional academia</article-title>&#x201D; in <source>Intersectionality and creative business education: Inclusive and diverse cultures in pedagogy</source>. ed. <person-group person-group-type="editor">
<name><surname>Nayak</surname> <given-names>B. S.</given-names></name>
</person-group> (<publisher-loc>Cham</publisher-loc>: <publisher-name>Springer Nature Switzerland</publisher-name>), <fpage>129</fpage>&#x2013;<lpage>159</lpage>.</citation>
</ref>
<ref id="ref38">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Hobfoll</surname> <given-names>S. E.</given-names></name>
</person-group> (<year>1989</year>). <article-title>Conservation of resources: a new attempt at conceptualizing stress</article-title>. <source>Am. Psychol.</source> <volume>44</volume>, <fpage>513</fpage>&#x2013;<lpage>524</lpage>. doi: <pub-id pub-id-type="doi">10.1037/0003-066X.44.3.513</pub-id>, PMID: <pub-id pub-id-type="pmid">2648906</pub-id></citation>
</ref>
<ref id="ref39">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Hobfoll</surname> <given-names>S. E.</given-names></name>
</person-group> (<year>2001</year>). <article-title>The influence of culture, community, and the nested-self in the stress process: advancing conservation of resources theory</article-title>. <source>Appl. Psychol.</source> <volume>50</volume>, <fpage>337</fpage>&#x2013;<lpage>421</lpage>. doi: <pub-id pub-id-type="doi">10.1111/1464-0597.00062</pub-id></citation>
</ref>
<ref id="ref40">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Hobfoll</surname> <given-names>S. E.</given-names></name> <name><surname>Halbesleben</surname> <given-names>J.</given-names></name> <name><surname>Neveu</surname> <given-names>J. P.</given-names></name> <name><surname>Westman</surname> <given-names>M.</given-names></name></person-group> (<year>2018</year>). <article-title>Conservation of resources in the organizational context: the reality of resources and their consequences</article-title>. <source>Annu. Rev. Organ. Psych. Organ. Behav.</source> <volume>5</volume>, <fpage>103</fpage>&#x2013;<lpage>128</lpage>. doi: <pub-id pub-id-type="doi">10.1146/annurev-orgpsych-032117-104640</pub-id></citation>
</ref>
<ref id="ref41">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Iqbal</surname> <given-names>J.</given-names></name> <name><surname>Asghar</surname> <given-names>A.</given-names></name> <name><surname>Asghar</surname> <given-names>M. Z.</given-names></name></person-group> (<year>2022</year>). <article-title>Effect of despotic leadership on employee turnover intention: mediating toxic workplace environment and cognitive distraction in academic institutions</article-title>. <source>Behav. Sci.</source> <volume>12</volume>:<fpage>125</fpage>. doi: <pub-id pub-id-type="doi">10.3390/bs12050125</pub-id>, PMID: <pub-id pub-id-type="pmid">35621422</pub-id></citation>
</ref>
<ref id="ref42">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Islam</surname> <given-names>M. Z.</given-names></name> <name><surname>Naqshbandi</surname> <given-names>M. M.</given-names></name> <name><surname>Bashir</surname> <given-names>M.</given-names></name> <name><surname>Ishak</surname> <given-names>N. A.</given-names></name></person-group> (<year>2022</year>). <article-title>Mitigating knowledge hiding behaviour through organisational social capital: a proposed framework</article-title>. <source>VINE J. Inf. Knowl. Manage. Syst.</source> <volume>2022</volume>:<fpage>45</fpage>. doi: <pub-id pub-id-type="doi">10.1108/VJIKMS-02-2022-0045</pub-id></citation>
</ref>
<ref id="ref43">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Jafari-Sadeghi</surname> <given-names>V.</given-names></name> <name><surname>Garcia-Perez</surname> <given-names>A.</given-names></name> <name><surname>Candelo</surname> <given-names>E.</given-names></name> <name><surname>Couturier</surname> <given-names>J.</given-names></name></person-group> (<year>2021</year>). <article-title>Exploring the impact of digital transformation on technology entrepreneurship and technological market expansion: the role of technology readiness, exploration and exploitation</article-title>. <source>J. Bus. Res.</source> <volume>124</volume>, <fpage>100</fpage>&#x2013;<lpage>111</lpage>. doi: <pub-id pub-id-type="doi">10.1016/j.jbusres.2020.11.020</pub-id></citation>
</ref>
<ref id="ref44">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Jafari-Sadeghi</surname> <given-names>V.</given-names></name> <name><surname>Mahdiraji</surname> <given-names>H. A.</given-names></name> <name><surname>Devalle</surname> <given-names>A.</given-names></name> <name><surname>Pellicelli</surname> <given-names>A. C.</given-names></name></person-group> (<year>2022</year>). <article-title>Somebody is hiding something: disentangling interpersonal level drivers and consequences of knowledge hiding in international entrepreneurial firms</article-title>. <source>J. Bus. Res.</source> <volume>139</volume>, <fpage>383</fpage>&#x2013;<lpage>396</lpage>. doi: <pub-id pub-id-type="doi">10.1016/j.jbusres.2021.09.068</pub-id></citation>
</ref>
<ref id="ref45">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Jahanzeb</surname> <given-names>S.</given-names></name> <name><surname>Fatima</surname> <given-names>T.</given-names></name> <name><surname>Bouckenooghe</surname> <given-names>D.</given-names></name> <name><surname>Bashir</surname> <given-names>F.</given-names></name></person-group> (<year>2019</year>). <article-title>The knowledge hiding link: a moderated mediation model of how abusive supervision affects employee creativity</article-title>. <source>Eur. J. Work Organ. Psy.</source> <volume>28</volume>, <fpage>810</fpage>&#x2013;<lpage>819</lpage>. doi: <pub-id pub-id-type="doi">10.1080/1359432X.2019.1659245</pub-id></citation>
</ref>
<ref id="ref46">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Javid</surname> <given-names>L.</given-names></name> <name><surname>Irfan</surname> <given-names>K.</given-names></name> <name><surname>Khattak</surname> <given-names>N. A.</given-names></name></person-group> (<year>2023</year>). <article-title>Impact of workplace bullying and knowledge hiding behaviour on emotional exhaustion among Pakistani nurses: a cross-sectional study for exploring psychological empowerment as an effective role player in the healthcare system</article-title>. <source>Glob. Soc. Sci. Rev.</source> <volume>VIII</volume>, <fpage>124</fpage>&#x2013;<lpage>138</lpage>. doi: <pub-id pub-id-type="doi">10.31703/gssr.2023(VIII-I).12</pub-id></citation>
</ref>
<ref id="ref47">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Jia</surname> <given-names>L.</given-names></name> <name><surname>Liang</surname> <given-names>Z.</given-names></name> <name><surname>Lei</surname> <given-names>C.</given-names></name> <name><surname>Huang</surname> <given-names>L.</given-names></name></person-group> (<year>2023</year>). <article-title>A study on the effects of college students&#x2019; knowledge-sharing behavior on group performance and individual social status</article-title>. <source>Front. Psychol.</source> <volume>14</volume>:<fpage>1172554</fpage>. doi: <pub-id pub-id-type="doi">10.3389/fpsyg.2023.1172554</pub-id>, PMID: <pub-id pub-id-type="pmid">37397320</pub-id></citation>
</ref>
<ref id="ref48">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Jin</surname> <given-names>X.</given-names></name> <name><surname>Hahm</surname> <given-names>S.</given-names></name></person-group> (<year>2021</year>). <article-title>Using online information support to decrease stress, anxiety, and depression</article-title>. <source>KSII Trans. Intern. Inf. Syst.</source> <volume>15</volume>, <fpage>2944</fpage>&#x2013;<lpage>2958</lpage>. doi: <pub-id pub-id-type="doi">10.3837/tiis.2021.08.013</pub-id></citation>
</ref>
<ref id="ref49">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Jin</surname> <given-names>X.</given-names></name> <name><surname>Qing</surname> <given-names>C.</given-names></name> <name><surname>Jin</surname> <given-names>S.</given-names></name></person-group> (<year>2022</year>). <article-title>Ethical leadership and innovative behavior: mediating role of voice behavior and moderated mediation role of psychological safety</article-title>. <source>Sustainability</source> <volume>14</volume>:<fpage>5125</fpage>. doi: <pub-id pub-id-type="doi">10.3390/su14095125</pub-id></citation>
</ref>
<ref id="ref50">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Jones</surname> <given-names>P.</given-names></name> <name><surname>Ratten</surname> <given-names>V.</given-names></name></person-group> (<year>2020</year>). <article-title>Knowledge spillovers and entrepreneurial ecosystems</article-title>. <source>Knowl. Manag. Res. Pract.</source> <volume>19</volume>, <fpage>1</fpage>&#x2013;<lpage>7</lpage>. doi: <pub-id pub-id-type="doi">10.1080/14778238.2020.1801363</pub-id></citation>
</ref>
<ref id="ref51">
<citation citation-type="other"><person-group person-group-type="author"><name><surname>Judge</surname> <given-names>T. A.</given-names></name> <name><surname>LePine</surname> <given-names>J. A.</given-names></name></person-group> (<year>2007</year>). The <article-title>Bright and dark sides of personality: implications for personnel selection in individual and team contexts</article-title>. In: <person-group person-group-type="editor"><name><surname>Langan-Fox</surname> <given-names>J.</given-names></name> <name><surname>Cooper</surname> <given-names>C.</given-names></name> <name><surname>Klimoski</surname> <given-names>R.</given-names></name></person-group>. <source>Research companion to the dysfunctional workplace: Management challenges and symptoms</source>. <publisher-loc>Northampton, MA</publisher-loc>: <publisher-name>Edward Elgar Publishing</publisher-name>. pp. <fpage>332</fpage>&#x2013;<lpage>355</lpage>.</citation>
</ref>
<ref id="ref52">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Karatepe</surname> <given-names>O. M.</given-names></name> <name><surname>Okumus</surname> <given-names>F.</given-names></name> <name><surname>Nosrati</surname> <given-names>S.</given-names></name> <name><surname>Gurcham</surname> <given-names>K.</given-names></name></person-group> (<year>2023</year>). <article-title>Test of a serial mediation model of Machiavellian leadership among hospitality and tourism employees</article-title>. <source>Int. J. Hosp. Manag.</source> <volume>111</volume>:<fpage>103462</fpage>. doi: <pub-id pub-id-type="doi">10.1016/j.ijhm.2023.103462</pub-id></citation>
</ref>
<ref id="ref53">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Kessler</surname> <given-names>R. C.</given-names></name> <name><surname>Andrews</surname> <given-names>G.</given-names></name> <name><surname>Colpe</surname> <given-names>L. J.</given-names></name> <name><surname>Hiripi</surname> <given-names>E.</given-names></name> <name><surname>Mroczek</surname> <given-names>D. K.</given-names></name> <name><surname>Normand</surname> <given-names>S. L.</given-names></name> <etal/></person-group>. (<year>2002</year>). <article-title>Short screening scales to monitor population prevalences and trends in non-specific psychological distress</article-title>. <source>Psychol. Med.</source> <volume>32</volume>, <fpage>959</fpage>&#x2013;<lpage>976</lpage>. doi: <pub-id pub-id-type="doi">10.1017/S0033291702006074</pub-id>, PMID: <pub-id pub-id-type="pmid">12214795</pub-id></citation>
</ref>
<ref id="ref54">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Khelladi</surname> <given-names>I.</given-names></name> <name><surname>Castellano</surname> <given-names>S.</given-names></name> <name><surname>Hobeika</surname> <given-names>J.</given-names></name> <name><surname>Perano</surname> <given-names>M.</given-names></name> <name><surname>Rutambuka</surname> <given-names>D.</given-names></name></person-group> (<year>2022</year>). <article-title>Customer knowledge hiding behavior in service multi-sided platforms</article-title>. <source>J. Bus. Res.</source> <volume>140</volume>, <fpage>482</fpage>&#x2013;<lpage>490</lpage>. doi: <pub-id pub-id-type="doi">10.1016/j.jbusres.2021.11.017</pub-id></citation>
</ref>
<ref id="ref55">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Khoreva</surname> <given-names>V.</given-names></name> <name><surname>Wechtler</surname> <given-names>H.</given-names></name></person-group> (<year>2020</year>). <article-title>Exploring the consequences of knowledge hiding: an agency theory perspective</article-title>. <source>J. Manag. Psychol.</source> <volume>35</volume>, <fpage>71</fpage>&#x2013;<lpage>84</lpage>. doi: <pub-id pub-id-type="doi">10.1108/JMP-11-2018-0514</pub-id></citation>
</ref>
<ref id="ref56">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Kiyani</surname> <given-names>A. S.</given-names></name> <name><surname>Atasever</surname> <given-names>M.</given-names></name> <name><surname>Rizvi</surname> <given-names>T. H.</given-names></name></person-group> (<year>2021</year>). <article-title>Impact of exploitative leadership on workplace incivility: role of psychological distress-evidence from banking sector</article-title>. <source>NICE Res. J.</source> <volume>14</volume>, <fpage>131</fpage>&#x2013;<lpage>149</lpage>. doi: <pub-id pub-id-type="doi">10.51239/nrjss.v14i1.262</pub-id></citation>
</ref>
<ref id="ref57">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Koay</surname> <given-names>K. Y.</given-names></name> <name><surname>Lim</surname> <given-names>P. K.</given-names></name></person-group> (<year>2022</year>). <article-title>Ethical leadership and knowledge hiding: testing the mediating and moderating mechanisms</article-title>. <source>J. Knowl. Manag.</source> <volume>26</volume>, <fpage>574</fpage>&#x2013;<lpage>591</lpage>. doi: <pub-id pub-id-type="doi">10.1108/JKM-02-2021-0091</pub-id></citation>
</ref>
<ref id="ref58">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Labafi</surname> <given-names>S.</given-names></name> <name><surname>Issac</surname> <given-names>A. C.</given-names></name> <name><surname>Sheidaee</surname> <given-names>S.</given-names></name></person-group> (<year>2022</year>). <article-title>Is hiding something you know as important as knowing it? Understanding knowledge hiding in IT-enabled services of Iran</article-title>. <source>Knowl. Manage. Res. Pract.</source> <volume>20</volume>, <fpage>461</fpage>&#x2013;<lpage>473</lpage>. doi: <pub-id pub-id-type="doi">10.1080/14778238.2021.1992314</pub-id></citation>
</ref>
<ref id="ref59">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Li</surname> <given-names>C.</given-names></name> <name><surname>Ashraf</surname> <given-names>S. F.</given-names></name> <name><surname>Shahzad</surname> <given-names>F.</given-names></name> <name><surname>Bashir</surname> <given-names>I.</given-names></name> <name><surname>Murad</surname> <given-names>M.</given-names></name> <name><surname>Syed</surname> <given-names>N.</given-names></name> <etal/></person-group>. (<year>2020</year>). <article-title>Influence of knowledge management practices on entrepreneurial and organizational performance: a mediated-moderation model</article-title>. <source>Front. Psychol.</source> <volume>11</volume>:<fpage>577106</fpage>. doi: <pub-id pub-id-type="doi">10.3389/fpsyg.2020.577106</pub-id>, PMID: <pub-id pub-id-type="pmid">33343453</pub-id></citation>
</ref>
<ref id="ref60">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Liu</surname> <given-names>C. E.</given-names></name> <name><surname>Yu</surname> <given-names>S.</given-names></name> <name><surname>Chen</surname> <given-names>Y.</given-names></name> <name><surname>He</surname> <given-names>W.</given-names></name></person-group> (<year>2020</year>). <article-title>Supervision incivility and employee psychological safety in the workplace</article-title>. <source>Int. J. Environ. Res. Public Health</source> <volume>17</volume>:<fpage>840</fpage>. doi: <pub-id pub-id-type="doi">10.3390/ijerph17030840</pub-id></citation>
</ref>
<ref id="ref61">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Liu</surname> <given-names>W.</given-names></name> <name><surname>Zhang</surname> <given-names>P.</given-names></name> <name><surname>Liao</surname> <given-names>J.</given-names></name> <name><surname>Hao</surname> <given-names>P.</given-names></name> <name><surname>Mao</surname> <given-names>J.</given-names></name></person-group> (<year>2016</year>). <article-title>Abusive supervision and employee creativity: the mediating role of psychological safety and organizational identification</article-title>. <source>Manag. Decis.</source> <volume>54</volume>, <fpage>130</fpage>&#x2013;<lpage>147</lpage>. doi: <pub-id pub-id-type="doi">10.1108/MD-09-2013-0443</pub-id></citation>
</ref>
<ref id="ref62">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Livne-Ofer</surname> <given-names>E.</given-names></name> <name><surname>Coyle-Shapiro</surname> <given-names>J. A.</given-names></name> <name><surname>Pearce</surname> <given-names>J. L.</given-names></name></person-group> (<year>2019</year>). <article-title>Eyes wide open: perceived exploitation and its consequences</article-title>. <source>Acad. Manag. J.</source> <volume>62</volume>, <fpage>1989</fpage>&#x2013;<lpage>2018</lpage>. doi: <pub-id pub-id-type="doi">10.5465/amj.2017.1421</pub-id></citation>
</ref>
<ref id="ref63">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Lyu</surname> <given-names>Y.</given-names></name> <name><surname>Wu</surname> <given-names>L. Z.</given-names></name> <name><surname>Ye</surname> <given-names>Y.</given-names></name> <name><surname>Kwan</surname> <given-names>H. K.</given-names></name> <name><surname>Chen</surname> <given-names>Y.</given-names></name></person-group> (<year>2023</year>). <article-title>Rebellion under exploitation: how and when exploitative leadership evokes employees&#x2019; workplace deviance</article-title>. <source>J. Bus. Ethics</source> <volume>185</volume>, <fpage>483</fpage>&#x2013;<lpage>498</lpage>. doi: <pub-id pub-id-type="doi">10.1007/s10551-022-05207-w</pub-id></citation>
</ref>
<ref id="ref64">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Magee</surname> <given-names>C.</given-names></name> <name><surname>Gordon</surname> <given-names>R.</given-names></name> <name><surname>Robinson</surname> <given-names>L.</given-names></name> <name><surname>Caputi</surname> <given-names>P.</given-names></name> <name><surname>Oades</surname> <given-names>L.</given-names></name></person-group> (<year>2017</year>). <article-title>Workplace bullying and absenteeism: the mediating roles of poor health and work engagement</article-title>. <source>Hum. Resour. Manag. J.</source> <volume>27</volume>, <fpage>319</fpage>&#x2013;<lpage>334</lpage>. doi: <pub-id pub-id-type="doi">10.1111/1748-8583.12156</pub-id></citation>
</ref>
<ref id="ref66">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Majeed</surname> <given-names>M.</given-names></name> <name><surname>Fatima</surname> <given-names>T.</given-names></name></person-group> (<year>2020</year>). <article-title>Impact of exploitative leadership on psychological distress: a study of nurses</article-title>. <source>J. Nurs. Manag.</source> <volume>28</volume>, <fpage>1713</fpage>&#x2013;<lpage>1724</lpage>. doi: <pub-id pub-id-type="doi">10.1111/jonm.13127</pub-id>, PMID: <pub-id pub-id-type="pmid">32772432</pub-id></citation>
</ref>
<ref id="ref67">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Mawritz</surname> <given-names>M. B.</given-names></name> <name><surname>Folger</surname> <given-names>R.</given-names></name> <name><surname>Latham</surname> <given-names>G. P.</given-names></name></person-group> (<year>2014</year>). <article-title>Supervisors&#x2019; exceedingly difficult goals and abusive supervision: the mediating effects of hindrance stress, anger, and anxiety</article-title>. <source>J. Organ. Behav.</source> <volume>35</volume>, <fpage>358</fpage>&#x2013;<lpage>372</lpage>. doi: <pub-id pub-id-type="doi">10.1002/job.1879</pub-id></citation>
</ref>
<ref id="ref68">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Miminoshvili</surname> <given-names>M.</given-names></name> <name><surname>&#x010C;erne</surname> <given-names>M.</given-names></name></person-group> (<year>2022</year>). <article-title>Workplace inclusion&#x2013;exclusion and knowledge-hiding behaviour of minority members</article-title>. <source>Knowl. Manag. Res. Pract.</source> <volume>20</volume>, <fpage>422</fpage>&#x2013;<lpage>435</lpage>. doi: <pub-id pub-id-type="doi">10.1080/14778238.2021.1960914</pub-id></citation>
</ref>
<ref id="ref69">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Mirza</surname> <given-names>M. Z.</given-names></name> <name><surname>Isha</surname> <given-names>A. S. N.</given-names></name> <name><surname>Memon</surname> <given-names>M. A.</given-names></name> <name><surname>Azeem</surname> <given-names>S.</given-names></name> <name><surname>Zahid</surname> <given-names>M.</given-names></name></person-group> (<year>2022</year>). <article-title>Psychosocial safety climate, safety compliance and safety participation: the mediating role of psychological distress</article-title>. <source>J. Manag. Organ.</source> <volume>28</volume>, <fpage>363</fpage>&#x2013;<lpage>378</lpage>. doi: <pub-id pub-id-type="doi">10.1017/jmo.2019.35</pub-id></citation>
</ref>
<ref id="ref70">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Moh&#x2019;d</surname> <given-names>S. S.</given-names></name> <name><surname>&#x010C;erne</surname> <given-names>M.</given-names></name> <name><surname>Zhang</surname> <given-names>P.</given-names></name></person-group> (<year>2021</year>). <article-title>An exploratory configurational analysis of knowledge hiding antecedents in project teams</article-title>. <source>Proj. Manag. J.</source> <volume>52</volume>, <fpage>31</fpage>&#x2013;<lpage>44</lpage>. doi: <pub-id pub-id-type="doi">10.1177/8756972820939768</pub-id></citation>
</ref>
<ref id="ref71">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Moin</surname> <given-names>M. F.</given-names></name> <name><surname>Omar</surname> <given-names>M. K.</given-names></name> <name><surname>Ali</surname> <given-names>A.</given-names></name> <name><surname>Rasheed</surname> <given-names>M. I.</given-names></name> <name><surname>Abdelmotaleb</surname> <given-names>M.</given-names></name></person-group> (<year>2022</year>). <article-title>A moderated mediation model of knowledge hiding</article-title>. <source>Serv. Ind. J.</source> <volume>2022</volume>, <fpage>1</fpage>&#x2013;<lpage>13</lpage>. doi: <pub-id pub-id-type="doi">10.1080/02642069.2022.2112180</pub-id></citation>
</ref>
<ref id="ref72">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Mubarak</surname> <given-names>N.</given-names></name> <name><surname>Khan</surname> <given-names>J.</given-names></name> <name><surname>Osmadi</surname> <given-names>A.</given-names></name></person-group> (<year>2022</year>). <article-title>How does leader&#x2019;s knowledge hiding kill innovative work behavior</article-title>. <source>Int. J. Manag. Proj. Bus.</source> <volume>15</volume>, <fpage>1048</fpage>&#x2013;<lpage>1063</lpage>. doi: <pub-id pub-id-type="doi">10.1108/IJMPB-01-2022-0014</pub-id></citation>
</ref>
<ref id="ref73">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Nunnally</surname> <given-names>J.</given-names></name>
</person-group> (<year>1978</year>). <source>Psychometric methods</source>. <publisher-loc>New York</publisher-loc>: <publisher-name>McGraw-Hill</publisher-name>.</citation>
</ref>
<ref id="ref74">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Obeidat</surname> <given-names>R. F.</given-names></name> <name><surname>Qanir</surname> <given-names>Y.</given-names></name> <name><surname>Turaani</surname> <given-names>H.</given-names></name></person-group> (<year>2018</year>). <article-title>The relationship between perceived competence and perceived workplace bullying among registered nurses: a cross sectional survey</article-title>. <source>Int. J. Nurs. Stud.</source> <volume>88</volume>, <fpage>71</fpage>&#x2013;<lpage>78</lpage>. doi: <pub-id pub-id-type="doi">10.1016/j.ijnurstu.2018.08.012</pub-id></citation>
</ref>
<ref id="ref75">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Ogbonnaya</surname> <given-names>C.</given-names></name> <name><surname>Daniels</surname> <given-names>K.</given-names></name> <name><surname>Connolly</surname> <given-names>S.</given-names></name> <name><surname>Van Veldhoven</surname> <given-names>M. J.</given-names></name> <name><surname>Nielsen</surname> <given-names>K.</given-names></name></person-group> (<year>2016</year>). &#x201C;<article-title>Employees, managers, and high performance work practices: a win-win or the transformational leader&#x2019;s exploitative approach to organizational performance</article-title>&#x201D; in <source>Understanding the high performance workplace</source>. eds. <person-group person-group-type="editor"><name><surname>Ashkanasy</surname> <given-names>N. M.</given-names></name> <name><surname>Bennett</surname> <given-names>R. J.</given-names></name> <name><surname>Martinko</surname> <given-names>M. J.</given-names></name></person-group> (<publisher-loc>Abingdon</publisher-loc>: <publisher-name>Routledge</publisher-name>), <fpage>57</fpage>&#x2013;<lpage>80</lpage>.</citation>
</ref>
<ref id="ref76">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Olan</surname> <given-names>F.</given-names></name> <name><surname>Arakpogun</surname> <given-names>E. O.</given-names></name> <name><surname>Suklan</surname> <given-names>J.</given-names></name> <name><surname>Nakpodia</surname> <given-names>F.</given-names></name> <name><surname>Damij</surname> <given-names>N.</given-names></name> <name><surname>Jayawickrama</surname> <given-names>U.</given-names></name></person-group> (<year>2022</year>). <article-title>Artificial intelligence and knowledge sharing: contributing factors to organizational performance</article-title>. <source>J. Bus. Res.</source> <volume>145</volume>, <fpage>605</fpage>&#x2013;<lpage>615</lpage>. doi: <pub-id pub-id-type="doi">10.1016/j.jbusres.2022.03.008</pub-id></citation>
</ref>
<ref id="ref77">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Park</surname> <given-names>J. H.</given-names></name> <name><surname>Carter</surname> <given-names>M. Z.</given-names></name> <name><surname>DeFrank</surname> <given-names>R. S.</given-names></name> <name><surname>Deng</surname> <given-names>Q.</given-names></name></person-group> (<year>2018</year>). <article-title>Abusive supervision, psychological distress, and silence: the effects of gender dissimilarity between supervisors and subordinates</article-title>. <source>J. Bus. Ethics</source> <volume>153</volume>, <fpage>775</fpage>&#x2013;<lpage>792</lpage>. doi: <pub-id pub-id-type="doi">10.1007/s10551-016-3384-3</pub-id></citation>
</ref>
<ref id="ref78">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Peng</surname> <given-names>A. C.</given-names></name> <name><surname>Schaubroeck</surname> <given-names>J. M.</given-names></name> <name><surname>Li</surname> <given-names>Y.</given-names></name></person-group> (<year>2014</year>). <article-title>Social exchange implications of own and coworkers' experiences of supervisory abuse</article-title>. <source>Acad. Manag. J.</source> <volume>57</volume>, <fpage>1385</fpage>&#x2013;<lpage>1405</lpage>. doi: <pub-id pub-id-type="doi">10.5465/amj.2012.0080</pub-id></citation>
</ref>
<ref id="ref79">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Peng</surname> <given-names>J.</given-names></name> <name><surname>Wang</surname> <given-names>Z.</given-names></name> <name><surname>Chen</surname> <given-names>X.</given-names></name></person-group> (<year>2019</year>). <article-title>Does self-serving leadership hinder team creativity? A moderated dual-path model</article-title>. <source>J. Bus. Ethics</source> <volume>159</volume>, <fpage>419</fpage>&#x2013;<lpage>433</lpage>. doi: <pub-id pub-id-type="doi">10.1007/s10551-018-3799-0</pub-id></citation>
</ref>
<ref id="ref80">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Pereira</surname> <given-names>V.</given-names></name> <name><surname>Mohiya</surname> <given-names>M.</given-names></name></person-group> (<year>2021</year>). <article-title>Share or hide? Investigating positive and negative employee intentions and organizational support in the context of knowledge sharing and hiding</article-title>. <source>J. Bus. Res.</source> <volume>129</volume>, <fpage>368</fpage>&#x2013;<lpage>381</lpage>. doi: <pub-id pub-id-type="doi">10.1016/j.jbusres.2021.03.011</pub-id></citation>
</ref>
<ref id="ref81">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Qin</surname> <given-names>Y.</given-names></name> <name><surname>Xie</surname> <given-names>Y.</given-names></name> <name><surname>Cooke</surname> <given-names>F. L.</given-names></name></person-group> (<year>2021</year>). <article-title>Unethical leadership and employee knowledge-hiding behavior in the Chinese context: a moderated dual-pathway model</article-title>. <source>Asian Bus. Manag.</source> <volume>22</volume>, <fpage>1</fpage>&#x2013;<lpage>25</lpage>. doi: <pub-id pub-id-type="doi">10.1057/s41291-021-00154-2</pub-id></citation>
</ref>
<ref id="ref82">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Raza</surname> <given-names>M. I.</given-names></name> <name><surname>Shah</surname> <given-names>T. A.</given-names></name></person-group> (<year>2023</year>). <article-title>Role of perfectionistic leader on employee creativity with mediating role of psychological distress and moderating role of trait mindfulness</article-title>. <source>J. Pol. Res.</source> <volume>9</volume>, <fpage>279</fpage>&#x2013;<lpage>289</lpage>. doi: <pub-id pub-id-type="doi">10.5281/zenodo.8169815</pub-id></citation>
</ref>
<ref id="ref83">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Reio</surname> <given-names>T. G.</given-names></name>
</person-group> (<year>2010</year>). <article-title>The threat of common method variance bias to theory building</article-title>. <source>Hum. Resour. Dev. Rev.</source> <volume>9</volume>, <fpage>405</fpage>&#x2013;<lpage>411</lpage>. doi: <pub-id pub-id-type="doi">10.1177/1534484310380331</pub-id></citation>
</ref>
<ref id="ref84">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Robinson</surname> <given-names>D.</given-names></name> <name><surname>Perryman</surname> <given-names>S.</given-names></name> <name><surname>Hayday</surname> <given-names>S.</given-names></name></person-group> (<year>2004</year>). <source>The drivers of employee engagement</source>. <publisher-loc>Brighton</publisher-loc>: <publisher-name>Institute for Employment Studies</publisher-name>.</citation>
</ref>
<ref id="ref85">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Rubbab</surname> <given-names>U. E.</given-names></name> <name><surname>Khattak</surname> <given-names>S. A.</given-names></name> <name><surname>Shahab</surname> <given-names>H.</given-names></name> <name><surname>Akhter</surname> <given-names>N.</given-names></name></person-group> (<year>2022</year>). <article-title>Impact of organizational dehumanization on employee knowledge hiding</article-title>. <source>Front. Psychol.</source> <volume>13</volume>:<fpage>803905</fpage>. doi: <pub-id pub-id-type="doi">10.3389/fpsyg.2022.803905</pub-id>, PMID: <pub-id pub-id-type="pmid">35265008</pub-id></citation>
</ref>
<ref id="ref86">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Schmid</surname> <given-names>E. A.</given-names></name> <name><surname>Pircher Verdorfer</surname> <given-names>A.</given-names></name> <name><surname>Peus</surname> <given-names>C.</given-names></name></person-group> (<year>2019</year>). <article-title>Shedding light on leaders&#x2019; self-interest: theory and measurement of exploitative leadership</article-title>. <source>J. Manag.</source> <volume>45</volume>, <fpage>1401</fpage>&#x2013;<lpage>1433</lpage>. doi: <pub-id pub-id-type="doi">10.1177/0149206317707810</pub-id></citation>
</ref>
<ref id="ref87">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Schmid</surname> <given-names>E. A.</given-names></name> <name><surname>Verdorfer</surname> <given-names>A. P.</given-names></name> <name><surname>Peus</surname> <given-names>C.</given-names></name></person-group> (<year>2018</year>). <article-title>Different shades-different effects? Consequences of different types of destructive leadership</article-title>. <source>Front. Psychol.</source> <volume>9</volume>:<fpage>1289</fpage>. doi: <pub-id pub-id-type="doi">10.3389/fpsyg.2018.01289</pub-id>, PMID: <pub-id pub-id-type="pmid">30090079</pub-id></citation>
</ref>
<ref id="ref1011">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Serenko</surname> <given-names>A.</given-names></name> <name><surname>Bontis</surname> <given-names>N.</given-names></name></person-group> (<year>2016</year>). <article-title>Understanding counterproductive knowledge behaviour: antecedents and consequences of intra-organizational knowledge hiding</article-title>. <source>J. Kno. Man.</source> <volume>20</volume>:<fpage>1199</fpage>. doi: <pub-id pub-id-type="doi">10.1108/JKM-05-2016-0203</pub-id></citation>
</ref>
<ref id="ref88">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Singh</surname> <given-names>S. K.</given-names></name>
</person-group> (<year>2019</year>). <article-title>Territoriality, task performance, and workplace deviance: empirical evidence on role of knowledge hiding</article-title>. <source>J. Bus. Res.</source> <volume>97</volume>, <fpage>10</fpage>&#x2013;<lpage>19</lpage>. doi: <pub-id pub-id-type="doi">10.1016/j.jbusres.2018.12.034</pub-id></citation>
</ref>
<ref id="ref89">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Singh</surname> <given-names>S. K.</given-names></name> <name><surname>Gupta</surname> <given-names>S.</given-names></name> <name><surname>Busso</surname> <given-names>D.</given-names></name> <name><surname>Kamboj</surname> <given-names>S.</given-names></name></person-group> (<year>2021</year>). <article-title>Top management knowledge value, knowledge sharing practices, open innovation and organizational performance</article-title>. <source>J. Bus. Res.</source> <volume>128</volume>, <fpage>788</fpage>&#x2013;<lpage>798</lpage>. doi: <pub-id pub-id-type="doi">10.1016/j.jbusres.2019.04.040</pub-id></citation>
</ref>
<ref id="ref90">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>&#x0160;kerlavaj</surname> <given-names>M.</given-names></name> <name><surname>Connelly</surname> <given-names>C. E.</given-names></name> <name><surname>Cerne</surname> <given-names>M.</given-names></name> <name><surname>Dysvik</surname> <given-names>A.</given-names></name></person-group> (<year>2018</year>). <article-title>Tell me if you can: time pressure, prosocial motivation, perspective taking, and knowledge hiding</article-title>. <source>J. Knowl. Manag.</source> <volume>22</volume>, <fpage>1489</fpage>&#x2013;<lpage>1509</lpage>. doi: <pub-id pub-id-type="doi">10.1108/JKM-05-2017-0179</pub-id></citation>
</ref>
<ref id="ref91">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Steel</surname> <given-names>P.</given-names></name>
</person-group> (<year>2010</year>). <article-title>Arousal, avoidant and decisional procrastinators: do they exist?</article-title> <source>Personal. Individ. Differ.</source> <volume>48</volume>, <fpage>926</fpage>&#x2013;<lpage>934</lpage>. doi: <pub-id pub-id-type="doi">10.1016/j.paid.2010.02.025</pub-id></citation>
</ref>
<ref id="ref92">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Sun</surname> <given-names>Z.</given-names></name> <name><surname>Wu</surname> <given-names>L. Z.</given-names></name> <name><surname>Ye</surname> <given-names>Y.</given-names></name> <name><surname>Kwan</surname> <given-names>H. K.</given-names></name></person-group> (<year>2023</year>). <article-title>The impact of exploitative leadership on hospitality employees&#x2019; proactive customer service performance: a self-determination perspective</article-title>. <source>Int. J. Contemp. Hosp. Manag.</source> <volume>35</volume>, <fpage>46</fpage>&#x2013;<lpage>63</lpage>. doi: <pub-id pub-id-type="doi">10.1108/IJCHM-11-2021-1417</pub-id></citation>
</ref>
<ref id="ref93">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Syed</surname> <given-names>F.</given-names></name> <name><surname>Akhtar</surname> <given-names>M. W.</given-names></name> <name><surname>Kashif</surname> <given-names>M.</given-names></name> <name><surname>Husnain</surname> <given-names>M.</given-names></name></person-group> (<year>2019</year>). <article-title>Interplay of exploitative leadership &#x0026; fear of negative evaluation on knowledge hiding &#x0026; outcomes</article-title>. <source>Acad. Manag. Proc.</source> <volume>2019</volume>:<fpage>17050</fpage>. doi: <pub-id pub-id-type="doi">10.5465/AMBPP.2019.152</pub-id></citation>
</ref>
<ref id="ref94">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Thompson</surname> <given-names>G.</given-names></name> <name><surname>Buch</surname> <given-names>R.</given-names></name> <name><surname>Glas&#x00F8;</surname> <given-names>L.</given-names></name></person-group> (<year>2018</year>). <article-title>Low-quality LMX relationships, leader incivility, and follower responses</article-title>. <source>J. Gen. Manag.</source> <volume>44</volume>, <fpage>17</fpage>&#x2013;<lpage>26</lpage>. doi: <pub-id pub-id-type="doi">10.1177/0306307018788808</pub-id></citation>
</ref>
<ref id="ref95">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Torkelson</surname> <given-names>E.</given-names></name> <name><surname>Holm</surname> <given-names>K.</given-names></name> <name><surname>B&#x00E4;ckstr&#x00F6;m</surname> <given-names>M.</given-names></name></person-group> (<year>2016</year>). <article-title>Workplace incivility in a Swedish context</article-title>. <source>Nord. J. Work. Life Stud.</source> <volume>6</volume>, <fpage>3</fpage>&#x2013;<lpage>22</lpage>. doi: <pub-id pub-id-type="doi">10.19154/njwls.v6i2.4969</pub-id></citation>
</ref>
<ref id="ref96">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Vessey</surname> <given-names>J. A.</given-names></name> <name><surname>DeMarco</surname> <given-names>R.</given-names></name> <name><surname>DiFazio</surname> <given-names>R.</given-names></name></person-group> (<year>2010</year>). <article-title>Bullying, harassment, and horizontal violence in the nursing workforce the state of the science</article-title>. <source>Annu. Rev. Nurs. Res.</source> <volume>28</volume>, <fpage>133</fpage>&#x2013;<lpage>157</lpage>. doi: <pub-id pub-id-type="doi">10.1891/0739-6686.28.133</pub-id></citation>
</ref>
<ref id="ref97">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Wang</surname> <given-names>Z.</given-names></name> <name><surname>Chen</surname> <given-names>Y.</given-names></name> <name><surname>Ren</surname> <given-names>S.</given-names></name> <name><surname>Collins</surname> <given-names>N.</given-names></name> <name><surname>Cai</surname> <given-names>S.</given-names></name> <name><surname>Rowley</surname> <given-names>C.</given-names></name></person-group> (<year>2023a</year>). <article-title>Exploitative leadership and employee innovative behaviour in China: a moderated mediation framework</article-title>. <source>Asia Pac. Bus. Rev.</source> <volume>29</volume>, <fpage>570</fpage>&#x2013;<lpage>587</lpage>. doi: <pub-id pub-id-type="doi">10.1080/13602381.2021.1990588</pub-id></citation>
</ref>
<ref id="ref98">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Wang</surname> <given-names>Z.</given-names></name> <name><surname>Ren</surname> <given-names>S.</given-names></name> <name><surname>Chadee</surname> <given-names>D.</given-names></name> <name><surname>Chen</surname> <given-names>Y.</given-names></name></person-group> (<year>2023b</year>). <article-title>Employee ethical silence under exploitative leadership: the roles of work meaningfulness and moral potency</article-title>. <source>J. Bus. Ethics</source> <volume>2023</volume>, <fpage>1</fpage>&#x2013;<lpage>18</lpage>. doi: <pub-id pub-id-type="doi">10.1007/s10551-023-05405-0</pub-id></citation>
</ref>
<ref id="ref99">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Wang</surname> <given-names>Z.</given-names></name> <name><surname>Sun</surname> <given-names>C.</given-names></name> <name><surname>Cai</surname> <given-names>S.</given-names></name></person-group> (<year>2021</year>). <article-title>How exploitative leadership influences employee innovative behavior: the mediating role of relational attachment and moderating role of high-performance work systems</article-title>. <source>Leadersh. Organ. Dev. J.</source> <volume>42</volume>, <fpage>233</fpage>&#x2013;<lpage>248</lpage>. doi: <pub-id pub-id-type="doi">10.1108/LODJ-05-2020-0203</pub-id></citation>
</ref>
<ref id="ref100">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Wang</surname> <given-names>J.</given-names></name> <name><surname>Tian</surname> <given-names>S.</given-names></name> <name><surname>Wang</surname> <given-names>Y.</given-names></name> <name><surname>Guo</surname> <given-names>Y.</given-names></name> <name><surname>Wei</surname> <given-names>X.</given-names></name> <name><surname>Zhou</surname> <given-names>X.</given-names></name> <etal/></person-group>. (<year>2023</year>). <article-title>The relationship between perceptions of leader hypocrisy and employees&#x2019; knowledge hiding behaviors: testing a moderated mediation model</article-title>. <source>Psychol. Res. Behav. Manag.</source> <volume>16</volume>, <fpage>133</fpage>&#x2013;<lpage>147</lpage>. doi: <pub-id pub-id-type="doi">10.2147/PRBM.S381364</pub-id>, PMID: <pub-id pub-id-type="pmid">36688227</pub-id></citation>
</ref>
<ref id="ref101">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Westman</surname> <given-names>M.</given-names></name> <name><surname>Hobfoll</surname> <given-names>S. E.</given-names></name> <name><surname>Chen</surname> <given-names>S.</given-names></name> <name><surname>Davidson</surname> <given-names>O. B.</given-names></name> <name><surname>Laski</surname> <given-names>S.</given-names></name></person-group> (<year>2004</year>). &#x201C;<article-title>Organizational stress through the lens of conservation of resources (COR) theory</article-title>&#x201D; in <source>Exploring interpersonal dynamics</source>. eds. <person-group person-group-type="editor"><name><surname>Perrewe</surname> <given-names>P. L.</given-names></name> <name><surname>Ganster</surname> <given-names>D. C.</given-names></name></person-group>, vol. <volume>4</volume> (<publisher-loc>Bingley, UK</publisher-loc>: <publisher-name>Emerald Group Publishing</publisher-name>), <fpage>167</fpage>&#x2013;<lpage>220</lpage>.</citation>
</ref>
<ref id="ref102">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Williams</surname> <given-names>L. J.</given-names></name> <name><surname>Brown</surname> <given-names>B. K.</given-names></name></person-group> (<year>1994</year>). <article-title>Method variance in organizational behavior and human resources research: effects on correlations, path coefficients, and hypothesis testing</article-title>. <source>Organ. Behav. Hum. Decis. Process.</source> <volume>57</volume>, <fpage>185</fpage>&#x2013;<lpage>209</lpage>. doi: <pub-id pub-id-type="doi">10.1006/obhd.1994.1011</pub-id></citation>
</ref>
<ref id="ref103">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Wu</surname> <given-names>L. Z.</given-names></name> <name><surname>Sun</surname> <given-names>Z.</given-names></name> <name><surname>Ye</surname> <given-names>Y.</given-names></name> <name><surname>Kwan</surname> <given-names>H. K.</given-names></name> <name><surname>Yang</surname> <given-names>M.</given-names></name></person-group> (<year>2021</year>). <article-title>The impact of exploitative leadership on frontline hospitality employees&#x2019; service performance: a social exchange perspective</article-title>. <source>Int. J. Hosp. Manag.</source> <volume>96</volume>:<fpage>102954</fpage>. doi: <pub-id pub-id-type="doi">10.1016/j.ijhm.2021.102954</pub-id></citation>
</ref>
<ref id="ref104">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Xia</surname> <given-names>Q.</given-names></name> <name><surname>Yan</surname> <given-names>S. M.</given-names></name> <name><surname>Li</surname> <given-names>H.</given-names></name> <name><surname>Duan</surname> <given-names>K. F.</given-names></name> <name><surname>Zhang</surname> <given-names>Y. L.</given-names></name></person-group> (<year>2022</year>). <article-title>A bibliometric analysis of knowledge-hiding research</article-title>. <source>Behav. Sci.</source> <volume>12</volume>:<fpage>122</fpage>. doi: <pub-id pub-id-type="doi">10.3390/bs12050122</pub-id>, PMID: <pub-id pub-id-type="pmid">35621419</pub-id></citation>
</ref>
<ref id="ref105">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Xiao</surname> <given-names>M.</given-names></name> <name><surname>Cooke</surname> <given-names>F. L.</given-names></name></person-group> (<year>2019</year>). <article-title>Why and when knowledge hiding in the workplace is harmful: a review of the literature and directions for future research in the Chinese context</article-title>. <source>Asia Pac. J. Hum. Resour.</source> <volume>57</volume>, <fpage>470</fpage>&#x2013;<lpage>502</lpage>. doi: <pub-id pub-id-type="doi">10.1111/1744-7941.12198</pub-id></citation>
</ref>
<ref id="ref106">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Xiong</surname> <given-names>C.</given-names></name> <name><surname>Chang</surname> <given-names>V.</given-names></name> <name><surname>Scuotto</surname> <given-names>V.</given-names></name> <name><surname>Shi</surname> <given-names>Y.</given-names></name> <name><surname>Paoloni</surname> <given-names>N.</given-names></name></person-group> (<year>2019</year>). <article-title>The social-psychological approach in understanding knowledge hiding within international R&#x0026;D teams: an inductive analysis</article-title>. <source>J. Bus. Res.</source> <volume>128</volume>, <fpage>799</fpage>&#x2013;<lpage>811</lpage>.</citation>
</ref>
<ref id="ref107">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Xu</surname> <given-names>G.</given-names></name> <name><surname>Huang</surname> <given-names>Y.</given-names></name> <name><surname>Huang</surname> <given-names>S. S.</given-names></name></person-group> (<year>2023</year>). <article-title>Informational justice and employee knowledge hiding behaviours: mediation of organizational identification and moderation of justice sensitivity</article-title>. <source>Heliyon</source> <volume>9</volume>:<fpage>e14697</fpage>. doi: <pub-id pub-id-type="doi">10.1016/j.heliyon.2023.e14697</pub-id></citation>
</ref>
<ref id="ref108">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Xu</surname> <given-names>G.</given-names></name> <name><surname>Xue</surname> <given-names>M.</given-names></name></person-group> (<year>2023</year>). <article-title>Unemployment risk perception and knowledge hiding under the disruption of artificial intelligence transformation</article-title>. <source>Soc. Behav. Personal. Int. J.</source> <volume>51</volume>, <fpage>1</fpage>&#x2013;<lpage>12</lpage>. doi: <pub-id pub-id-type="doi">10.2224/sbp.12106</pub-id></citation>
</ref>
<ref id="ref109">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Xu</surname> <given-names>J.</given-names></name> <name><surname>Zhu</surname> <given-names>D.</given-names></name> <name><surname>Li</surname> <given-names>Y.</given-names></name></person-group> (<year>2022</year>). <article-title>Does small and medium enterprise differential leadership increase subordinate knowledge hiding? Evidences from job insecurity, territorial consciousness and leadership performance expectation</article-title>. <source>Front. Psychol.</source> <volume>13</volume>:<fpage>983669</fpage>. doi: <pub-id pub-id-type="doi">10.3389/fpsyg.2022.983669</pub-id>, PMID: <pub-id pub-id-type="pmid">36186282</pub-id></citation>
</ref>
<ref id="ref110">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Yang</surname> <given-names>K.</given-names></name> <name><surname>Ribiere</surname> <given-names>V.</given-names></name></person-group> (<year>2020</year>). <article-title>Drivers of knowledge hiding in the university context</article-title>. <source>Online J. Appl. Knowl. Manage.</source> <volume>8</volume>, <fpage>99</fpage>&#x2013;<lpage>116</lpage>. doi: <pub-id pub-id-type="doi">10.36965/OJAKM.2020.8(1)99-116</pub-id></citation>
</ref>
<ref id="ref111">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Yang</surname> <given-names>F.</given-names></name> <name><surname>Yang</surname> <given-names>L.</given-names></name> <name><surname>Li</surname> <given-names>P.</given-names></name></person-group> (<year>2021</year>). <article-title>The dynamic game of knowledge hiding behavior from organizational members: to hide or not to hide?</article-title> <source>Complexity</source> <volume>2021</volume>, <fpage>1</fpage>&#x2013;<lpage>15</lpage>. doi: <pub-id pub-id-type="doi">10.1155/2021/1713890</pub-id></citation>
</ref>
<ref id="ref112">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Yao</surname> <given-names>Z.</given-names></name> <name><surname>Zhang</surname> <given-names>X.</given-names></name> <name><surname>Luo</surname> <given-names>J.</given-names></name> <name><surname>Huang</surname> <given-names>H.</given-names></name></person-group> (<year>2020</year>). <article-title>Offense is the best defense: the impact of workplace bullying on knowledge hiding</article-title>. <source>J. Knowl. Manag.</source> <volume>24</volume>, <fpage>675</fpage>&#x2013;<lpage>695</lpage>. doi: <pub-id pub-id-type="doi">10.1108/JKM-12-2019-0755</pub-id></citation>
</ref>
<ref id="ref113">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Ye</surname> <given-names>Y.</given-names></name> <name><surname>Lyu</surname> <given-names>Y.</given-names></name> <name><surname>Wu</surname> <given-names>L. Z.</given-names></name> <name><surname>Kwan</surname> <given-names>H. K.</given-names></name></person-group> (<year>2022</year>). <article-title>Exploitative leadership and service sabotage</article-title>. <source>Ann. Tour. Res.</source> <volume>95</volume>:<fpage>103444</fpage>. doi: <pub-id pub-id-type="doi">10.1016/j.annals.2022.103444</pub-id></citation>
</ref>
<ref id="ref114">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Yue</surname> <given-names>L.</given-names></name> <name><surname>Zheng</surname> <given-names>Y.</given-names></name> <name><surname>Ye</surname> <given-names>M.</given-names></name></person-group> (<year>2022</year>). <article-title>The impact of esports industry knowledge alliances on innovation performance: a mediation model based on knowledge sharing</article-title>. <source>Front. Psychol.</source> <volume>13</volume>:<fpage>902473</fpage>. doi: <pub-id pub-id-type="doi">10.3389/fpsyg.2022.902473</pub-id>, PMID: <pub-id pub-id-type="pmid">35586243</pub-id></citation>
</ref>
<ref id="ref115">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Zhai</surname> <given-names>X.</given-names></name> <name><surname>Wang</surname> <given-names>M.</given-names></name> <name><surname>Ghani</surname> <given-names>U.</given-names></name></person-group> (<year>2020</year>). <article-title>The SOR (stimulus-organism-response) paradigm in online learning: an empirical study of students&#x2019; knowledge hiding perceptions</article-title>. <source>Interact. Learn. Environ.</source> <volume>28</volume>, <fpage>586</fpage>&#x2013;<lpage>601</lpage>. doi: <pub-id pub-id-type="doi">10.1080/10494820.2019.1696841</pub-id></citation>
</ref>
<ref id="ref116">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Zhao</surname> <given-names>H. Q.</given-names></name> <name><surname>Xia</surname> <given-names>P.</given-names></name> <name><surname>He</surname> <given-names>G.</given-names></name> <name><surname>Sheard</surname> <given-names>G.</given-names></name> <name><surname>Wan</surname> <given-names>P.</given-names></name></person-group> (<year>2016</year>). <article-title>Workplace ostracism and knowledge hiding in service organisations</article-title>. <source>Int. J. Hosp. Manag.</source> <volume>59</volume>, <fpage>84</fpage>&#x2013;<lpage>94</lpage>. doi: <pub-id pub-id-type="doi">10.1016/j.ijhm.2016.09.009</pub-id></citation>
</ref>
</ref-list>
</back>
</article>