<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.3 20210610//EN" "JATS-journalpublishing1-3-mathml3.dtd">
<article xml:lang="EN" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:ali="http://www.niso.org/schemas/ali/1.0/" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" dtd-version="1.3" article-type="research-article">
<front>
<journal-meta>
<journal-id journal-id-type="publisher-id">Front. Psychol.</journal-id>
<journal-title-group>
<journal-title>Frontiers in Psychology</journal-title>
<abbrev-journal-title abbrev-type="pubmed">Front. Psychol.</abbrev-journal-title>
</journal-title-group>
<issn pub-type="epub">1664-1078</issn>
<publisher>
<publisher-name>Frontiers Media S.A.</publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id pub-id-type="doi">10.3389/fpsyg.2025.1730215</article-id>
<article-version article-version-type="Version of Record" vocab="NISO-RP-8-2008"/>
<article-categories>
<subj-group subj-group-type="heading">
<subject>Original Research</subject>
</subj-group>
</article-categories>
<title-group>
<article-title>Illegitimate tasks, knowledge hiding, and performance erosion: a four-wave latent change score investigation</article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name><surname>Zhu</surname> <given-names>Honghong</given-names></name>
<xref ref-type="aff" rid="aff1"/>
<uri xlink:href="https://loop.frontiersin.org/people/2635374"/>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="Data curation" vocab-term-identifier="https://credit.niso.org/contributor-roles/data-curation/">Data curation</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="investigation" vocab-term-identifier="https://credit.niso.org/contributor-roles/investigation/">Investigation</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="Writing &#x2013; review &amp; editing" vocab-term-identifier="https://credit.niso.org/contributor-roles/writing-review-editing/">Writing &#x2013; review &#x0026; editing</role>
</contrib>
<contrib contrib-type="author">
<name><surname>Gu</surname> <given-names>Xuan</given-names></name>
<xref ref-type="aff" rid="aff1"/>
<uri xlink:href="https://loop.frontiersin.org/people/3151475"/>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="Data curation" vocab-term-identifier="https://credit.niso.org/contributor-roles/data-curation/">Data curation</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="investigation" vocab-term-identifier="https://credit.niso.org/contributor-roles/investigation/">Investigation</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="Writing &#x2013; original draft" vocab-term-identifier="https://credit.niso.org/contributor-roles/writing-original-draft/">Writing &#x2013; original draft</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="Writing &#x2013; review &amp; editing" vocab-term-identifier="https://credit.niso.org/contributor-roles/writing-review-editing/">Writing &#x2013; review &#x0026; editing</role>
</contrib>
<contrib contrib-type="author" corresp="yes">
<name><surname>Jiang</surname> <given-names>Daokui</given-names></name>
<xref ref-type="aff" rid="aff1"/>
<xref ref-type="corresp" rid="c001"><sup>&#x0002A;</sup></xref>
<xref ref-type="author-notes" rid="fn001"><sup>&#x02020;</sup></xref>
<uri xlink:href="https://loop.frontiersin.org/people/1389454"/>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="conceptualization" vocab-term-identifier="https://credit.niso.org/contributor-roles/conceptualization/">Conceptualization</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="Data curation" vocab-term-identifier="https://credit.niso.org/contributor-roles/data-curation/">Data curation</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="methodology" vocab-term-identifier="https://credit.niso.org/contributor-roles/methodology/">Methodology</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="Writing &#x2013; original draft" vocab-term-identifier="https://credit.niso.org/contributor-roles/writing-original-draft/">Writing &#x2013; original draft</role>
</contrib>
<contrib contrib-type="author">
<name><surname>Liu</surname> <given-names>Yaru</given-names></name>
<xref ref-type="aff" rid="aff1"/>
<uri xlink:href="https://loop.frontiersin.org/people/3270194"/>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="Data curation" vocab-term-identifier="https://credit.niso.org/contributor-roles/data-curation/">Data curation</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="investigation" vocab-term-identifier="https://credit.niso.org/contributor-roles/investigation/">Investigation</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="Writing &#x2013; review &amp; editing" vocab-term-identifier="https://credit.niso.org/contributor-roles/writing-review-editing/">Writing &#x2013; review &#x0026; editing</role>
</contrib>
</contrib-group>
<aff id="aff1"><institution>Business School, Shandong Normal University</institution>, <city>Jinan</city>, <country country="cn">China</country></aff>
<author-notes>
<corresp id="c001"><label>&#x0002A;</label>Correspondence: Daokui Jiang, <email xlink:href="mailto:jdk240504@163.com">jdk240504@163.com</email></corresp>
<fn fn-type="other" id="fn001"><label>&#x02020;</label><p>ORCID: Daokui Jiang <uri xlink:href="https://orcid.org/0000-0002-2341-6127">orcid.org/0000-0002-2341-6127</uri></p></fn></author-notes>
<pub-date publication-format="electronic" date-type="pub" iso-8601-date="2026-01-23">
<day>23</day>
<month>01</month>
<year>2026</year>
</pub-date>
<pub-date publication-format="electronic" date-type="collection">
<year>2025</year>
</pub-date>
<volume>16</volume>
<elocation-id>1730215</elocation-id>
<history>
<date date-type="received">
<day>30</day>
<month>10</month>
<year>2025</year>
</date>
<date date-type="rev-recd">
<day>12</day>
<month>12</month>
<year>2025</year>
</date>
<date date-type="accepted">
<day>24</day>
<month>12</month>
<year>2025</year>
</date>
</history>
<permissions>
<copyright-statement>Copyright &#x000A9; 2026 Zhu, Gu, Jiang and Liu.</copyright-statement>
<copyright-year>2026</copyright-year>
<copyright-holder>Zhu, Gu, Jiang and Liu</copyright-holder>
<license>
<ali:license_ref start_date="2026-01-23">https://creativecommons.org/licenses/by/4.0/</ali:license_ref>
<license-p>This is an open-access article distributed under the terms of the <ext-link ext-link-type="uri" xlink:href="https://creativecommons.org/licenses/by/4.0/">Creative Commons Attribution License (CC BY)</ext-link>. The use, distribution or reproduction in other forums is permitted, provided the original author(s) and the copyright owner(s) are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.</license-p>
</license>
</permissions>
<abstract>
<p>This four-wave longitudinal study reframes unnecessary and unreasonable tasks as relational stimuli. Latent change score modeling on 250 employees (1 month intervals) showed that within-person increases in unnecessary tasks heightened knowledge hiding (&#x003B2; = 0.30-0.32), which subsequently eroded task performance (indirect effect &#x0003D; &#x02212;0.12 to&#x02212;0.14). Unreasonable tasks exerted comparable indirect harm (indirect &#x0003D; &#x02212;0.11 to&#x02212;0.12) but carried no significant direct effect on performance (&#x003B2; &#x0003D; &#x02212;0.08, <italic>p</italic> = 0.183). Thus, both forms of illegitimate tasks damage later performance solely through the amplification of knowledge hiding, challenging static &#x0201C;stressor&#x02013;strain&#x0201D; assumptions and underscoring the need to curb defective task design before collaborative exchanges are undermined.</p></abstract>
<kwd-group>
<kwd>challenge-hindrance theory</kwd>
<kwd>knowledge sharing knowledge hiding</kwd>
<kwd>latent change score modeling</kwd>
<kwd>performance</kwd>
<kwd>task</kwd>
<kwd>unnecessary tasks</kwd>
<kwd>unreasonable tasks</kwd>
</kwd-group>
<funding-group>
<funding-statement>The author(s) declared that financial support was not received for this work and/or its publication.</funding-statement>
</funding-group>
<counts>
<fig-count count="1"/>
<table-count count="8"/>
<equation-count count="0"/>
<ref-count count="55"/>
<page-count count="12"/>
<word-count count="8886"/>
</counts>
<custom-meta-group>
<custom-meta>
<meta-name>section-at-acceptance</meta-name>
<meta-value>Organizational Psychology</meta-value>
</custom-meta>
</custom-meta-group>
</article-meta>
</front>
<body>
<sec sec-type="intro" id="s1">
<title>Introduction</title>
<p>Organizations continue to grapple with the persistent problem of &#x0201C;bad jobs&#x0201D; that expose employees to work characteristics widely regarded as detrimental&#x02014;namely, tasks that are redundant, illogical, or impossible to execute properly (<xref ref-type="bibr" rid="B36">Oldham and Hackman, 2010</xref>). Two under-studied yet increasingly salient facets are unnecessary tasks (i.e., redundant or meaningless work that serves no value-added purpose) and unreasonable tasks (i.e., assignments that violate logic, feasibility, or ethical standards). While cross-sectional studies typically treat such demands as classic hindrance stressors that erode motivation and performance (<xref ref-type="bibr" rid="B2">Cavanaugh et al., 2000</xref>), employees in modern knowledge contexts often cannot simply withdraw; instead, they must find real-time solutions to complete the work (<xref ref-type="bibr" rid="B49">Tan et al., 2024</xref>). Understanding how these problematic demands unfold over time and whether they can spark collaborative coping behaviors is therefore critical for both theory and practice.</p>
<p>Extant research on hindrance demands has relied heavily on between-person, static designs that compare individuals high vs. low on perceived hindrances (<xref ref-type="bibr" rid="B42">Podsakoff et al., 2007</xref>). Consequently, we know little about within-person dynamics: do rises in unnecessary or unreasonable tasks prompt employees to share knowledge more frequently, and does such collaboration ultimately sustain task performance? A handful of qualitative studies hint that bureaucratic burdens may unintentionally foster mutual assistance (<xref ref-type="bibr" rid="B17">Grant and Ashford, 2008</xref>), but longitudinal, quantitative evidence is absent. Moreover, the challenge-hindrance appraisal framework has recently been re-conceptualized as a dynamic process wherein individuals reappraise initially obstructive demands as challenges or as solvable via collective action (<xref ref-type="bibr" rid="B45">Rodell and Judge, 2009</xref>). Yet this theoretical pivot awaits empirical tests capable of modeling intra-individual change while separating initial levels from growth trajectories.</p>
<p>Additionally, prior studies have often conflated different types of hindrance demands, overlooking their dimension-specific effects (<xref ref-type="bibr" rid="B53">Webster et al., 2010</xref>). For example, unnecessary tasks may be perceived as more controllable than unreasonable tasks, leading to different coping strategies (<xref ref-type="bibr" rid="B31">Lazarus and Folkman, 1984</xref>). Furthermore, knowledge hiding has been identified as a key behavioral mechanism through which employees mitigate work stressors (<xref ref-type="bibr" rid="B52">Wang and Noe, 2010</xref>), yet its longitudinal role in response to task design flaws remains underexplored. Finally, most job design research has focused on static outcomes such as job satisfaction or burnout, rather than dynamic performance trajectories (<xref ref-type="bibr" rid="B37">Parker et al., 2017</xref>).</p>
<p>To address these gaps, we collected four waves of survey data from 250 knowledge workers at 3 month intervals and applied bivariate latent change score modeling (LCSM) (<xref ref-type="bibr" rid="B33">McArdle, 2009</xref>). LCSM decomposes observed scores into an initial level and a latent change factor for each construct, thereby offering a rigorous test of how within-person increases in unnecessary and unreasonable tasks predict corresponding changes in knowledge hiding and subsequent task performance (<xref ref-type="bibr" rid="B28">Kruk et al., 2023</xref>). Grounded in challenge-hindrance appraisal theory, we argue that employees who experience growing unnecessary work will appraise it as a controllable hindrance and engage in knowledge hiding as a proactive workaround; in contrast, escalating unreasonable tasks&#x02014;perceived as less controllable&#x02014;will evoke direct, effortful problem solving rather than collaborative exchange. We further integrate Conservation of Resources (COR) theory (<xref ref-type="bibr" rid="B21">Hobfoll, 1989</xref>) to posit that employees invest in knowledge hiding as a resource-generating strategy to prevent further loss of time and energy. Meanwhile, social functionalism (<xref ref-type="bibr" rid="B10">Durkheim and Coser, 1998</xref>) suggests that institutional deficiencies (e.g., poor task design) activate informal adversity-driven defensive withdrawal to maintain system functionality. Thus, we expect different temporal pathways for unnecessary vs. unreasonable tasks.</p>
<p>This study addresses the following question: Do within-person increases in illegitimate tasks (unnecessary vs. unreasonable) trigger knowledge hiding, and does this behavioral response subsequently erode task performance over time? We propose that both task types, by violating implicit contracts about meaningful work, will activate resource-protection motives leading to knowledge concealment. <xref ref-type="fig" rid="F1">Figure 1</xref> illustrates our latent change score model, which disaggregates between-person and within-person variance to test temporal mediation. By modeling intra-individual change across 4 monthly waves, we provide a dynamic test of how &#x0201C;bad tasks&#x0201D; become performance liabilities through the micro-mechanism of knowledge hiding.</p>
<fig position="float" id="F1">
<label>Figure 1</label>
<caption><p>Research model.</p></caption>
<graphic mimetype="image" mime-subtype="tiff" xlink:href="fpsyg-16-1730215-g0001.tif">
<alt-text content-type="machine-generated">Flowchart depicting relationships between task types and changes in knowledge hiding and task performance. Arrows connect &#x0201C;Unnecessary tasks&#x0201D; and &#x0201C;Unreasonable tasks&#x0201D; to &#x0201C;Knowledge hiding change,&#x0201D; which then links to &#x0201C;Task performance change.&#x0201D;</alt-text>
</graphic>
</fig>
<p>The present study makes four primary contributions. First, by modeling intra-individual change rather than between-person differences, we provide the first longitudinal evidence that &#x0201C;bad tasks&#x0201D; can generate functional, collaborative behaviors over time, refining the predominantly static challenge-hindrance literature (<xref ref-type="bibr" rid="B45">Rodell and Judge, 2009</xref>). Second, we unpack the dimension-specific effects of unnecessary vs. unreasonable tasks, demonstrating that only the former stimulates knowledge hiding, whereas the latter lifts performance through a direct, non-collaborative pathway. Third, our use of LCSM advances methodology in job design research by explicitly separating baseline levels from dynamic slopes, thereby offering stronger causal inference regarding the temporal ordering of demands, sharing behaviors, and performance outcomes (<xref ref-type="bibr" rid="B33">McArdle, 2009</xref>). Finally, we integrate COR theory and social functionalism to explain why employees convert task adversity into collective gain, offering a multi-level theoretical account of &#x0201C;adversity-driven collaboration&#x0201D; in contemporary organizations.</p>
</sec>
<sec id="s2">
<title>Theory and hypotheses</title>
<sec>
<title>Theoretical foundation</title>
<p>Recent advances (2020&#x02013;2024) have refined our understanding of illegitimate tasks and knowledge dynamics. Meta-analytic evidence (<xref ref-type="bibr" rid="B41">Pindek et al., 2021</xref>) confirms illegitimate tasks as robust predictors of counterproductive work behaviors (<xref ref-type="bibr" rid="B54">Yuan and Yan, 2024</xref>), while daily diary studies (<xref ref-type="bibr" rid="B16">Gabriel et al., 2023</xref>) reveal their dynamic spillover effects. Regarding knowledge hiding, <xref ref-type="bibr" rid="B18">Gro&#x00161;elj et al. (2020)</xref> meta-analysis (<italic>k</italic> = 65, <italic>N</italic> = 21,000) identifies perceived organizational injustice as a primary antecedent, with stronger effects in high power-distance cultures (<xref ref-type="bibr" rid="B23">Jiang et al., 2023</xref>). Critically, <xref ref-type="bibr" rid="B24">Katz et al. (2023)</xref> reconceptualize illegitimate tasks as &#x0201C;stress-as-offense-to-self,&#x0201D; emphasizing resource threat over challenge appraisal. These dynamic perspectives highlight a crucial gap: no longitudinal study has modeled within-person change processes linking illegitimate tasks, knowledge hiding, and performance trajectories using latent change score modeling (LCSM), which offers stronger causal inference than cross-lagged panels (<xref ref-type="bibr" rid="B19">Hamaker et al., 2015</xref>; <xref ref-type="bibr" rid="B27">Kottwitz et al., 2025</xref>).</p>
<p>This study integrates challenge-hindrance appraisal theory (<xref ref-type="bibr" rid="B2">Cavanaugh et al., 2000</xref>; <xref ref-type="bibr" rid="B45">Rodell and Judge, 2009</xref>) with Conservation of Resources (COR) theory (<xref ref-type="bibr" rid="B21">Hobfoll, 1989</xref>) and social functionalism (<xref ref-type="bibr" rid="B10">Durkheim and Coser, 1998</xref>) to explain why within-person increases in two forms of &#x0201C;bad&#x0201D; tasks&#x02014;unnecessary vs. unreasonable&#x02014;activate distinct behavioral pathways that ultimately influence task performance. Challenge-hindrance theory posits that stressful demands are interpreted as either controllable hindrances or uncontrollable threats; controllable hindrances stimulate proactive, collaborative coping, whereas uncontrollable hindrances elicit direct or solitary effort (<xref ref-type="bibr" rid="B45">Rodell and Judge, 2009</xref>). COR theory adds that employees invest existing resources (e.g., expertise) to generate new resources (e.g., social support) when threatened (<xref ref-type="bibr" rid="B21">Hobfoll, 1989</xref>). Social functionalism further contends that institutional deficiencies (e.g., poor task design) trigger informal adversity-driven defensive withdrawal to maintain system functionality (<xref ref-type="bibr" rid="B10">Durkheim and Coser, 1998</xref>). Synthesizing these perspectives, we propose an asymmetric mediation model in which knowledge hiding change transmits the effect of unnecessary-task change, but not unreasonable-task change, to performance change.</p>
</sec>
<sec>
<title>Unnecessary tasks and knowledge-hiding change</title>
<p>Challenge-hindrance appraisal theory contends that when employees encounter job demands they perceive as controllable, they are inclined to interpret them as surmountable hindrances rather than threats (<xref ref-type="bibr" rid="B2">Cavanaugh et al., 2000</xref>; <xref ref-type="bibr" rid="B45">Rodell and Judge, 2009</xref>). Unnecessary tasks&#x02014;work that is redundant, low-value, or bureaucratic&#x02014;precisely fit this appraisal profile because individuals believe the waste can be reduced through better coordination (<xref ref-type="bibr" rid="B53">Webster et al., 2010</xref>). From a conservation-of-resources (COR) perspective, such appraisals trigger proactive investment of existing resources (time, expertise) to generate new resources (social support, reciprocity) that prevent further resource drain (<xref ref-type="bibr" rid="B21">Hobfoll, 1989</xref>). Knowledge hiding represents a low-cost, high-leverage investment: exchanging tips, templates, or work-arounds can eliminate duplicated effort and simultaneously build interpersonal resources (<xref ref-type="bibr" rid="B52">Wang and Noe, 2010</xref>). Recent experience-sampling studies show that daily fluctuations in redundant work predict same-day elevations in help-seeking and information giving (<xref ref-type="bibr" rid="B25">Koopman et al., 2016</xref>), while a three-wave panel found that employees who reported increasing bureaucratic demands subsequently increased collaborative problem-solving (<xref ref-type="bibr" rid="B50">Tims et al., 2015</xref>). Because unnecessary tasks are appraised as controllable and remediable, within-person increases should stimulate individuals to pool collective knowledge.</p>
<p><italic>H1: Within-person increases in unnecessary tasks will be positively related to within-person increases in knowledge hiding</italic>.</p>
</sec>
<sec>
<title>Unreasonable tasks and knowledge hiding change</title>
<p>Unreasonable tasks&#x02014;assignments that are illogical, ethically dubious, or impossible to complete satisfactorily&#x02014;are typically appraised as low in controllability and high in self-threat (<xref ref-type="bibr" rid="B31">Lazarus and Folkman, 1984</xref>). Challenge-hindrance theory predicts that when hindrances are viewed as uncontrollable, employees shift from collaborative sense-making to direct compliance or private problem-solving in order to avoid blame or reputational damage (<xref ref-type="bibr" rid="B38">Pham Thi and Duong, 2024</xref>; <xref ref-type="bibr" rid="B45">Rodell and Judge, 2009</xref>). COR theory adds that under high threat and low control, individuals conserve rather than expend resources; sharing proprietary knowledge may be judged too risky if the assignment itself is irrational (<xref ref-type="bibr" rid="B21">Hobfoll, 1989</xref>). Longitudinal evidence supports this reasoning: a four-wave study found that rises in illegitimate tasks did not predict subsequent collegial helping but did predict solitary extra-role effort (<xref ref-type="bibr" rid="B11">Eatough et al., 2015</xref>). Similarly, an experience-sampling investigation showed that daily unreasonable requests increased employees&#x00027; silent compliance behaviors while decreasing cooperative voice (<xref ref-type="bibr" rid="B25">Koopman et al., 2016</xref>). Consequently, within-person growth in unreasonable tasks should not elicit greater knowledge hiding.</p>
<p><italic>H2: Within-person increases in unreasonable tasks will NOT be significantly related to within-person increases in knowledge hiding</italic>.</p>
</sec>
<sec>
<title>Knowledge hiding change and task-performance change</title>
<p>Knowledge hiding delivers three performance-relevant resources: diversified solution sets, rapid error correction, and socio-emotional support that sustains self-efficacy (<xref ref-type="bibr" rid="B52">Wang and Noe, 2010</xref>). Meta-analytic evidence indicates that individual-level knowledge-hiding behaviors correlate &#x003C1; = 0.34 with supervisor-rated task performance (<xref ref-type="bibr" rid="B30">L&#x000E5;stad et al., 2025</xref>). Longitudinally, a four-wave study of R&#x00026;D engineers revealed that within-person increases in daily knowledge hiding predicted objective project output 3 months later (<xref ref-type="bibr" rid="B50">Tims et al., 2015</xref>). From a social-functionalism angle, informal knowledge exchange functions as a micro-repair mechanism that compensates for formal system defects (<xref ref-type="bibr" rid="B10">Durkheim and Coser, 1998</xref>); when employees pool know-how, they shorten learning curves and reduce redundant iterations, thereby maintaining output quality even under sub-optimal task conditions. Thus, as individuals share more knowledge over time, their own task performance should improve.</p>
<p><italic>H3: Within-person increases in knowledge hiding will be positively related to within-person increases in task performance</italic>.</p>
</sec>
<sec>
<title>Mediating role of knowledge-hiding change</title>
<p>Building on the logic developed in H1&#x02013;H3, we argue that knowledge-hiding change functions as a key behavioral conduit through which escalating unnecessary tasks translate into performance gains, whereas unreasonable tasks bypass this collaborative route and exert only a direct effect on performance.</p>
<p>First, unnecessary tasks are appraised as controllable hindrances that can be alleviated through joint sense-making (<xref ref-type="bibr" rid="B45">Rodell and Judge, 2009</xref>). When employees experience a within-person uptick in redundant or low-value work, they proactively exchange templates, short-cuts, and coordination scripts to eliminate duplication (<xref ref-type="bibr" rid="B29">Kunzelmann et al., 2025</xref>; <xref ref-type="bibr" rid="B52">Wang and Noe, 2010</xref>). This incremental knowledge pooling shortens task completion time, reduces error rates, and signals cooperative intent to supervisors&#x02014;objective and symbolic benefits that feed directly into performance evaluations (<xref ref-type="bibr" rid="B30">L&#x000E5;stad et al., 2025</xref>). Longitudinal evidence supports this causal chain: a four-wave panel of R&#x00026;D engineers revealed that increases in daily knowledge hiding predicted supervisor-rated performance 3 months later (<xref ref-type="bibr" rid="B50">Tims et al., 2015</xref>). Thus, knowledge-hiding change should statistically mediate the effect of unnecessary-task change on performance change.</p>
<p>Second, unreasonable tasks are appraised as uncontrollable and self-threatening (<xref ref-type="bibr" rid="B31">Lazarus and Folkman, 1984</xref>). Employees respond with private, effortful compliance rather than open collaboration, fearing that public questioning may damage credibility (<xref ref-type="bibr" rid="B11">Eatough et al., 2015</xref>; <xref ref-type="bibr" rid="B46">Schilbach et al., 2023</xref>). Because knowledge-hiding change is not significantly triggered by unreasonable-task change (cf. H2), an indirect effect through this pathway is unlikely. Instead, unreasonable tasks may elevate performance through alternative mechanisms such as impression management or intensive solo problem-solving (<xref ref-type="bibr" rid="B53">Webster et al., 2010</xref>).</p>
<p>Taken together, we propose an asymmetric mediation model: knowledge-hiding change transmits the benefits of unnecessary tasks but not of unreasonable tasks to performance.</p>
<p><italic>H4a: Within-person increases in knowledge hiding will mediate the positive relationship between within-person increases in unnecessary tasks and task-performance change</italic>.</p>
<p><italic>H4b: The indirect effect of unreasonable-task change on performance change via knowledge-hiding change will be non-significant</italic>.</p>
</sec>
</sec>
<sec id="s3">
<title>Research design</title>
<sec>
<title>Participants and procedure</title>
<p>The data collection process can be summarized into the following steps: Firstly, the translation and simplification of the scale. The accuracy and original meaning of the scale are ensured through the translation and back-translation process. At the same time, to reduce the burden on participants and improve the quality of the responses, a simplified version of the scale was used for the knowledge hiding behavior.</p>
<p>Secondly, the research design and selection of research subjects. To facilitate sampling, full-time employees from 18 companies- selected by two-stage stratified random sampling (18 firms drawn from the provincial register followed by 10-30 employees per firm chosen via anonymized rosters)- were randomly selected as the subjects of the survey. Each company conducted the survey through the head of the human resources department, with a sample size ranging from 3 to 30 people, including positions such as marketing, research and development, production, administration, finance, etc. The human resources department obtained the consent of the participants to ensure voluntary participation. To ensure the confidentiality of the survey data, all participants were identified only by a unique ID.</p>
<p>Next, the pre-survey and screening. The pre-survey was conducted on the last working day of the second week in April, and confirmation was made the next day for those who did not respond. Information such as gender, age, education level, work experience, job category, job level, and company type were collected, and a total of 350 people were solicited to fill out the questionnaire.</p>
<p>Next, the data collection time and method. The first formal collection was on the last working day of the third week in May, with a requirement to complete it before Saturday, collecting other questions except for demographic variables, and after matching, a total of 337 valid questionnaires were received; a month later, based on the first valid sample, the second formal collection was on the last working day of the third week in June, with a requirement to complete it before Saturday, collecting other questions except for demographic variables, and after matching, a total of 317 valid questionnaires were received; another month later, based on the second valid sample, the third formal collection was on the last working day of the third week in July, with a requirement to complete it before Saturday, collecting other questions except for demographic variables, and after matching, a total of 251 valid questionnaires were received; for all surveys, matching was done through a unique ID, and it was set that only one questionnaire could be filled per IP.</p>
<p>Finally, reducing sample loss and reward mechanism. Unqualified questionnaires were excluded based on the following criteria: attention test questions, such as selecting Beijing as the capital; short filling time, such as less than 2 mins; random filling, such as all options being the same; whether they participated in the previous round of the survey. To encourage serious and responsible completion, each participant received a cash red envelope reward of 10-15 yuan after completing the questionnaire each time.</p>
</sec>
<sec>
<title>Variables measurement</title>
<p>All the measures were translated from English to Chinese following the translation-back translation procedure by <xref ref-type="bibr" rid="B1">Brislin (1980)</xref>.</p>
<p>Illegitimate Task. Illegitimate tasks consist of two dimensions: unnecessary tasks and unreasonable tasks. These are measured using an 8-item scale developed by (<xref ref-type="bibr" rid="B48">Semmer et al., 2010</xref>), where participants are asked to make choices on a 5-point scale (ranging from 1 for &#x0201C;strongly disagree&#x0201D; to 5 for &#x0201C;strongly agree&#x0201D;). Unnecessary tasks include four items, such as &#x0201C;I have to deal with tasks that are completely unnecessary&#x0201D; and &#x0201C;I have to deal with tasks that are entirely meaningless.&#x0201D; The Cronbach&#x00027;s alpha for these four measurements was 0.89, 0.90, 0.88, and 0.89, respectively; unreasonable tasks also include four items, such as &#x0201C;I have to deal with tasks that should be done by someone else&#x0201D; and &#x0201C;I have to deal with tasks that are irrelevant to me and should not be my responsibility.&#x0201D; The Cronbach&#x00027;s alpha for these four measurements was 0.91, 0.92, 0.93, and 0.94, respectively.</p>
<p>Knowledge Hiding Behavior. Knowledge hiding behavior is measured using a modified scale developed by (<xref ref-type="bibr" rid="B44">Rhee and Choi, 2016</xref>), where leaders are asked to rate their subordinates&#x00027; behavior on a 5-point scale (ranging from 1 for &#x0201C;completely non-compliant&#x0201D; to 5 for &#x0201C;fully compliant,&#x0201D;) including four items, such as &#x0201C;Promises to inform the subordinate, but actually has no intention of doing so&#x0201D; and &#x0201C;Even though the subordinate knows this information, they might claim not to know.&#x0201D; The Cronbach&#x00027;s alpha for these four measurements was 0.91, 0.92, 0.90, and 0.91, respectively.</p>
<p>Task Performance. Task performance is measured using a modified scale developed by (<xref ref-type="bibr" rid="B51">Van Dyne and LePine, 1998</xref>), where leaders are asked to rate their subordinates&#x00027; performance on a 5-point scale (ranging from 1 for &#x0201C;completely non-compliant&#x0201D; to 5 for &#x0201C;fully compliant&#x0201D;), including four items, such as &#x0201C;Fully completes the assigned work tasks&#x0201D; and &#x0201C;Work performance meets job performance standards.&#x0201D; The Cronbach&#x00027;s alpha for these four measurements was 0.96, 0.95, 0.94, and 0.94, respectively.</p>
</sec>
<sec>
<title>Analytic strategies</title>
<p>We specified a bivariate latent change score model (<xref ref-type="bibr" rid="B33">McArdle, 2009</xref>) in Mplus 8.8 following four analytic steps. Power analysis using Monte Carlo simulation (Mplus) indicated that <italic>N</italic> = 250 provides 0.89 power to detect the observed indirect effect (&#x003B2; &#x0003D; &#x02212;0.12) at &#x003B1; = 0.05. This exceeds the minimum <italic>N</italic> = 200 recommended for LCSM with four indicators per construct. First, a longitudinal measurement model was estimated in which each wave-specific latent factor was indicated by its four manifest items, factor loadings were fixed to 1, and residual variances were constrained to equality across time to ensure metric invariance. Second, latent change factors were created by regressing each construct&#x00027;s level factor on itself at adjacent waves and freely estimating the slope factor with loadings 0, 1, 2, and 3, thereby modeling constant rate of change. Third, the structural model regressed the knowledge-hiding slope and the task-performance slope on both the unnecessary-task slope and the unreasonable-task slope, while control variables (gender, age, education, organizational tenure) were included as predictors of all initial-level factors and latent change slopes to account for demographic influences on baseline perceptions and change trajectories. Finally, parameters were estimated with the robust maximum-likelihood estimator (MLR) to correct for non-normality, and missing values were handled by full-information maximum-likelihood (<xref ref-type="bibr" rid="B12">Enders, 2010</xref>).</p>
</sec>
</sec>
<sec id="s4">
<title>Data analysis</title>
<sec>
<title>Descriptive statistics, construct validity, and longitudinal measurement invariance</title>
<p><xref ref-type="table" rid="T1">Table 1</xref> presents the descriptive statistics and zero-order correlations for the 250 valid cases across the four waves (T1&#x02013;T4). Overall, the mean levels of unnecessary tasks (UT) and unreasonable tasks (UnT) remained relatively stable over time, with UT means ranging from 3.03 to 3.11 and UnT means ranging from 2.93 to 2.97. Standard deviations were approximately 1.0 for both constructs, and Cronbach&#x00027;s &#x003B1; coefficients ranged from 0.88 to 0.89, indicating good internal consistency.</p>
<table-wrap position="float" id="T1">
<label>Table 1</label>
<caption><p>Means, standards, and correlations for study variables.</p></caption>
<table frame="box" rules="all">
<thead>
<tr>
<th valign="top" align="left"><bold>Variables</bold></th>
<th valign="top" align="center"><bold><italic>M</italic></bold></th>
<th valign="top" align="center"><bold><italic>SD</italic></bold></th>
<th valign="top" align="center"><bold>Gen</bold></th>
<th valign="top" align="center"><bold>Age</bold></th>
<th valign="top" align="center"><bold>Edu</bold></th>
<th valign="top" align="center"><bold>1</bold></th>
<th valign="top" align="center"><bold>2</bold></th>
<th valign="top" align="center"><bold>3</bold></th>
<th valign="top" align="center"><bold>4</bold></th>
<th valign="top" align="center"><bold>5</bold></th>
<th valign="top" align="center"><bold>6</bold></th>
<th valign="top" align="center"><bold>7</bold></th>
<th valign="top" align="center"><bold>8</bold></th>
<th valign="top" align="center"><bold>9</bold></th>
<th valign="top" align="center"><bold>10</bold></th>
<th valign="top" align="center"><bold>11</bold></th>
<th valign="top" align="center"><bold>12</bold></th>
<th valign="top" align="center"><bold>13</bold></th>
<th valign="top" align="center"><bold>14</bold></th>
<th valign="top" align="center"><bold>15</bold></th>
<th valign="top" align="center"><bold>16</bold></th>
</tr>
</thead>
<tbody>
<tr>
<td valign="top" align="left">Gender</td>
<td valign="top" align="center">1.60</td>
<td valign="top" align="center">0.49</td>
<td valign="top" align="center">-</td>
<td/>
<td/>
<td/>
<td/>
<td/>
<td/>
<td/>
<td/>
<td/>
<td/>
<td/>
<td/>
<td/>
<td/>
<td/>
<td/>
<td/>
<td/>
</tr>
<tr>
<td valign="top" align="left">Age</td>
<td valign="top" align="center">2.44</td>
<td valign="top" align="center">1.12</td>
<td valign="top" align="center">&#x02212;0.03</td>
<td valign="top" align="center">-</td>
<td/>
<td/>
<td/>
<td/>
<td/>
<td/>
<td/>
<td/>
<td/>
<td/>
<td/>
<td/>
<td/>
<td/>
<td/>
<td/>
<td/>
</tr>
<tr>
<td valign="top" align="left">Edu</td>
<td valign="top" align="center">3.18</td>
<td valign="top" align="center">0.65</td>
<td valign="top" align="center">0.00</td>
<td valign="top" align="center">&#x02212;0.04</td>
<td valign="top" align="center">-</td>
<td/>
<td/>
<td/>
<td/>
<td/>
<td/>
<td/>
<td/>
<td/>
<td/>
<td/>
<td/>
<td/>
<td/>
<td/>
<td/>
</tr>
<tr>
<td valign="top" align="left">1 unnecessary tasks (T1)</td>
<td valign="top" align="center">3.03</td>
<td valign="top" align="center">1.01</td>
<td valign="top" align="center">&#x02212;0.01</td>
<td valign="top" align="center">&#x02212;0.07</td>
<td valign="top" align="center">0.12</td>
<td valign="top" align="center"><italic>(0.88)</italic></td>
<td/>
<td/>
<td/>
<td/>
<td/>
<td/>
<td/>
<td/>
<td/>
<td/>
<td/>
<td/>
<td/>
<td/>
<td/>
</tr>
<tr>
<td valign="top" align="left">2 unreasonable tasks (T1)</td>
<td valign="top" align="center">2.93</td>
<td valign="top" align="center">0.96</td>
<td valign="top" align="center">&#x02212;0.06</td>
<td valign="top" align="center">&#x02212;0.14<sup>&#x0002A;</sup></td>
<td valign="top" align="center">0.14<sup>&#x0002A;</sup></td>
<td valign="top" align="center">0.73<sup>&#x0002A;&#x0002A;</sup></td>
<td valign="top" align="center"><italic>(0.88)</italic></td>
<td/>
<td/>
<td/>
<td/>
<td/>
<td/>
<td/>
<td/>
<td/>
<td/>
<td/>
<td/>
<td/>
<td/>
</tr>
<tr>
<td valign="top" align="left">3 unnecessary tasks (T2)</td>
<td valign="top" align="center">3.11</td>
<td valign="top" align="center">0.98</td>
<td valign="top" align="center">0.04</td>
<td valign="top" align="center">&#x02212;0.08</td>
<td valign="top" align="center">0.16<sup>&#x0002A;</sup></td>
<td valign="top" align="center">0.62<sup>&#x0002A;&#x0002A;</sup></td>
<td valign="top" align="center">0.54<sup>&#x0002A;&#x0002A;</sup></td>
<td valign="top" align="center"><italic>(0.89)</italic></td>
<td/>
<td/>
<td/>
<td/>
<td/>
<td/>
<td/>
<td/>
<td/>
<td/>
<td/>
<td/>
<td/>
</tr>
<tr>
<td valign="top" align="left">4 unreasonable tasks (T2)</td>
<td valign="top" align="center">2.95</td>
<td valign="top" align="center">0.94</td>
<td valign="top" align="center">0.01</td>
<td valign="top" align="center">&#x02212;0.08</td>
<td valign="top" align="center">0.15<sup>&#x0002A;</sup></td>
<td valign="top" align="center">0.53<sup>&#x0002A;&#x0002A;</sup></td>
<td valign="top" align="center">0.60<sup>&#x0002A;&#x0002A;</sup></td>
<td valign="top" align="center">0.78<sup>&#x0002A;&#x0002A;</sup></td>
<td valign="top" align="center"><italic>(0.88)</italic></td>
<td/>
<td/>
<td/>
<td/>
<td/>
<td/>
<td/>
<td/>
<td/>
<td/>
<td/>
<td/>
</tr>
<tr>
<td valign="top" align="left">5 unnecessary tasks (T3)</td>
<td valign="top" align="center">3.03</td>
<td valign="top" align="center">0.98</td>
<td valign="top" align="center">0.02</td>
<td valign="top" align="center">&#x02212;0.16<sup>&#x0002A;</sup></td>
<td valign="top" align="center">0.14<sup>&#x0002A;</sup></td>
<td valign="top" align="center">0.64<sup>&#x0002A;&#x0002A;</sup></td>
<td valign="top" align="center">0.58<sup>&#x0002A;&#x0002A;</sup></td>
<td valign="top" align="center">0.68<sup>&#x0002A;&#x0002A;</sup></td>
<td valign="top" align="center">0.61<sup>&#x0002A;&#x0002A;</sup></td>
<td valign="top" align="center"><italic>(0.89)</italic></td>
<td/>
<td/>
<td/>
<td/>
<td/>
<td/>
<td/>
<td/>
<td/>
<td/>
<td/>
</tr>
<tr>
<td valign="top" align="left">6 unreasonable tasks (T3)</td>
<td valign="top" align="center">2.96</td>
<td valign="top" align="center">0.90</td>
<td valign="top" align="center">&#x02212;0.01</td>
<td valign="top" align="center">&#x02212;0.15<sup>&#x0002A;</sup></td>
<td valign="top" align="center">0.15<sup>&#x0002A;</sup></td>
<td valign="top" align="center">0.56<sup>&#x0002A;&#x0002A;</sup></td>
<td valign="top" align="center">0.63<sup>&#x0002A;&#x0002A;</sup></td>
<td valign="top" align="center">0.61<sup>&#x0002A;&#x0002A;</sup></td>
<td valign="top" align="center">0.67<sup>&#x0002A;&#x0002A;</sup></td>
<td valign="top" align="center">0.82<sup>&#x0002A;&#x0002A;</sup></td>
<td valign="top" align="center"><italic>(0.89)</italic></td>
<td/>
<td/>
<td/>
<td/>
<td/>
<td/>
<td/>
<td/>
<td/>
<td/>
</tr>
<tr>
<td valign="top" align="left">7 unnecessary tasks (T4)</td>
<td valign="top" align="center">3.05</td>
<td valign="top" align="center">0.99</td>
<td valign="top" align="center">0.03</td>
<td valign="top" align="center">&#x02212;0.14<sup>&#x0002A;</sup></td>
<td valign="top" align="center">0.11</td>
<td valign="top" align="center">0.63<sup>&#x0002A;&#x0002A;</sup></td>
<td valign="top" align="center">0.57<sup>&#x0002A;&#x0002A;</sup></td>
<td valign="top" align="center">0.70<sup>&#x0002A;&#x0002A;</sup></td>
<td valign="top" align="center">0.64<sup>&#x0002A;&#x0002A;</sup></td>
<td valign="top" align="center">0.78<sup>&#x0002A;&#x0002A;</sup></td>
<td valign="top" align="center">0.65<sup>&#x0002A;&#x0002A;</sup></td>
<td valign="top" align="center"><italic>(0.89)</italic></td>
<td/>
<td/>
<td/>
<td/>
<td/>
<td/>
<td/>
<td/>
<td/>
</tr>
<tr>
<td valign="top" align="left">8 unreasonable tasks (T4)</td>
<td valign="top" align="center">2.97</td>
<td valign="top" align="center">0.88</td>
<td valign="top" align="center">0.02</td>
<td valign="top" align="center">&#x02212;0.10</td>
<td valign="top" align="center">0.08</td>
<td valign="top" align="center">0.57<sup>&#x0002A;&#x0002A;</sup></td>
<td valign="top" align="center">0.62<sup>&#x0002A;&#x0002A;</sup></td>
<td valign="top" align="center">0.59<sup>&#x0002A;&#x0002A;</sup></td>
<td valign="top" align="center">0.66<sup>&#x0002A;&#x0002A;</sup></td>
<td valign="top" align="center">0.66<sup>&#x0002A;&#x0002A;</sup></td>
<td valign="top" align="center">0.71<sup>&#x0002A;&#x0002A;</sup></td>
<td valign="top" align="center">0.78<sup>&#x0002A;&#x0002A;</sup></td>
<td valign="top" align="center"><italic>(0.88)</italic></td>
<td/>
<td/>
<td/>
<td/>
<td/>
<td/>
<td/>
<td/>
</tr>
<tr>
<td valign="top" align="left">9 knowledge hiding behavior (T1)</td>
<td valign="top" align="center">2.05</td>
<td valign="top" align="center">0.84</td>
<td valign="top" align="center">&#x02212;0.15<sup>&#x0002A;</sup></td>
<td valign="top" align="center">&#x02212;0.12</td>
<td valign="top" align="center">0.07</td>
<td valign="top" align="center">0.30<sup>&#x0002A;&#x0002A;</sup></td>
<td valign="top" align="center">0.33<sup>&#x0002A;&#x0002A;</sup></td>
<td valign="top" align="center">0.27<sup>&#x0002A;&#x0002A;</sup></td>
<td valign="top" align="center">0.23<sup>&#x0002A;&#x0002A;</sup></td>
<td valign="top" align="center">0.32<sup>&#x0002A;&#x0002A;</sup></td>
<td valign="top" align="center">0.31<sup>&#x0002A;&#x0002A;</sup></td>
<td valign="top" align="center">0.35<sup>&#x0002A;&#x0002A;</sup></td>
<td valign="top" align="center">0.32<sup>&#x0002A;&#x0002A;</sup></td>
<td valign="top" align="center">(0.87)</td>
<td/>
<td/>
<td/>
<td/>
<td/>
<td/>
<td/>
</tr>
<tr>
<td valign="top" align="left">10 knowledge hiding behavior (T2)</td>
<td valign="top" align="center">2.13</td>
<td valign="top" align="center">0.86</td>
<td valign="top" align="center">&#x02212;0.19<sup>&#x0002A;&#x0002A;</sup></td>
<td valign="top" align="center">0.03</td>
<td valign="top" align="center">0.12</td>
<td valign="top" align="center">0.26<sup>&#x0002A;&#x0002A;</sup></td>
<td valign="top" align="center">0.22<sup>&#x0002A;&#x0002A;</sup></td>
<td valign="top" align="center">0.31<sup>&#x0002A;&#x0002A;</sup></td>
<td valign="top" align="center">0.19<sup>&#x0002A;&#x0002A;</sup></td>
<td valign="top" align="center">0.31<sup>&#x0002A;&#x0002A;</sup></td>
<td valign="top" align="center">0.19<sup>&#x0002A;&#x0002A;</sup></td>
<td valign="top" align="center">0.28<sup>&#x0002A;&#x0002A;</sup></td>
<td valign="top" align="center">0.20<sup>&#x0002A;&#x0002A;</sup></td>
<td valign="top" align="center">0.53<sup>&#x0002A;&#x0002A;</sup></td>
<td valign="top" align="center"><italic>(0.88)</italic></td>
<td/>
<td/>
<td/>
<td/>
<td/>
<td/>
</tr>
<tr>
<td valign="top" align="left">11 knowledge hiding behavior (T3)</td>
<td valign="top" align="center">2.10</td>
<td valign="top" align="center">0.81</td>
<td valign="top" align="center">&#x02212;0.07</td>
<td valign="top" align="center">&#x02212;0.13<sup>&#x0002A;</sup></td>
<td valign="top" align="center">0.15<sup>&#x0002A;</sup></td>
<td valign="top" align="center">0.25<sup>&#x0002A;&#x0002A;</sup></td>
<td valign="top" align="center">0.30<sup>&#x0002A;&#x0002A;</sup></td>
<td valign="top" align="center">0.25<sup>&#x0002A;&#x0002A;</sup></td>
<td valign="top" align="center">0.22<sup>&#x0002A;&#x0002A;</sup></td>
<td valign="top" align="center">0.38<sup>&#x0002A;&#x0002A;</sup></td>
<td valign="top" align="center">0.33<sup>&#x0002A;&#x0002A;</sup></td>
<td valign="top" align="center">0.36<sup>&#x0002A;&#x0002A;</sup></td>
<td valign="top" align="center">0.23<sup>&#x0002A;&#x0002A;</sup></td>
<td valign="top" align="center">0.58<sup>&#x0002A;&#x0002A;</sup></td>
<td valign="top" align="center">0.54<sup>&#x0002A;&#x0002A;</sup></td>
<td valign="top" align="center"><italic>(0.88)</italic></td>
<td/>
<td/>
<td/>
<td/>
<td/>
</tr>
<tr>
<td valign="top" align="left">12 knowledge hiding behavior (T4)</td>
<td valign="top" align="center">2.17</td>
<td valign="top" align="center">0.82</td>
<td valign="top" align="center">&#x02212;0.10</td>
<td valign="top" align="center">&#x02212;0.16<sup>&#x0002A;</sup></td>
<td valign="top" align="center">0.08</td>
<td valign="top" align="center">0.30<sup>&#x0002A;&#x0002A;</sup></td>
<td valign="top" align="center">0.31<sup>&#x0002A;&#x0002A;</sup></td>
<td valign="top" align="center">0.25<sup>&#x0002A;&#x0002A;</sup></td>
<td valign="top" align="center">0.27<sup>&#x0002A;&#x0002A;</sup></td>
<td valign="top" align="center">0.41<sup>&#x0002A;&#x0002A;</sup></td>
<td valign="top" align="center">0.33<sup>&#x0002A;&#x0002A;</sup></td>
<td valign="top" align="center">0.44<sup>&#x0002A;&#x0002A;</sup></td>
<td valign="top" align="center">0.32<sup>&#x0002A;&#x0002A;</sup></td>
<td valign="top" align="center">0.53<sup>&#x0002A;&#x0002A;</sup></td>
<td valign="top" align="center">0.45<sup>&#x0002A;&#x0002A;</sup></td>
<td valign="top" align="center">0.70<sup>&#x0002A;&#x0002A;</sup></td>
<td valign="top" align="center"><italic>(0.87)</italic></td>
<td/>
<td/>
<td/>
<td/>
</tr>
<tr>
<td valign="top" align="left">13 task performance (T1)</td>
<td valign="top" align="center">3.97</td>
<td valign="top" align="center">0.76</td>
<td valign="top" align="center">0.16<sup>&#x0002A;&#x0002A;</sup></td>
<td valign="top" align="center">&#x02212;0.07</td>
<td valign="top" align="center">&#x02212;0.09</td>
<td valign="top" align="center">&#x02212;0.18<sup>&#x0002A;&#x0002A;</sup></td>
<td valign="top" align="center">&#x02212;0.12</td>
<td valign="top" align="center">&#x02212;0.146<sup>&#x0002A;</sup></td>
<td valign="top" align="center">&#x02212;0.06</td>
<td valign="top" align="center">&#x02212;0.09</td>
<td valign="top" align="center">&#x02212;0.03</td>
<td valign="top" align="center">&#x02212;0.09</td>
<td valign="top" align="center">0.03</td>
<td valign="top" align="center">&#x02212;0.23<sup>&#x0002A;&#x0002A;</sup></td>
<td valign="top" align="center">&#x02212;0.50<sup>&#x0002A;&#x0002A;</sup></td>
<td valign="top" align="center">&#x02212;0.15<sup>&#x0002A;</sup></td>
<td valign="top" align="center">&#x02212;0.10</td>
<td valign="top" align="center"><italic>(0.90)</italic></td>
<td/>
<td/>
<td/>
</tr>
<tr>
<td valign="top" align="left">14 task performance (T2)</td>
<td valign="top" align="center">3.99</td>
<td valign="top" align="center">0.57</td>
<td valign="top" align="center">0.15<sup>&#x0002A;</sup></td>
<td valign="top" align="center">&#x02212;0.03</td>
<td valign="top" align="center">&#x02212;0.09</td>
<td valign="top" align="center">&#x02212;0.23<sup>&#x0002A;&#x0002A;</sup></td>
<td valign="top" align="center">&#x02212;0.18<sup>&#x0002A;&#x0002A;</sup></td>
<td valign="top" align="center">&#x02212;0.16<sup>&#x0002A;</sup></td>
<td valign="top" align="center">&#x02212;0.11</td>
<td valign="top" align="center">&#x02212;0.19<sup>&#x0002A;&#x0002A;</sup></td>
<td valign="top" align="center">&#x02212;01</td>
<td valign="top" align="center">&#x02212;0.20<sup>&#x0002A;&#x0002A;</sup></td>
<td valign="top" align="center">&#x02212;0.14<sup>&#x0002A;</sup></td>
<td valign="top" align="center">&#x02212;0.29<sup>&#x0002A;&#x0002A;</sup></td>
<td valign="top" align="center">&#x02212;0.42<sup>&#x0002A;&#x0002A;</sup></td>
<td valign="top" align="center">&#x02212;0.23<sup>&#x0002A;&#x0002A;</sup></td>
<td valign="top" align="center">&#x02212;0.25<sup>&#x0002A;&#x0002A;</sup></td>
<td valign="top" align="center">0.74<sup>&#x0002A;&#x0002A;</sup></td>
<td valign="top" align="center"><italic>(0.90)</italic></td>
<td/>
<td/>
</tr>
<tr>
<td valign="top" align="left">15 task performance (T3)</td>
<td valign="top" align="center">4.05</td>
<td valign="top" align="center">0.60</td>
<td valign="top" align="center">0.05</td>
<td valign="top" align="center">0.04</td>
<td valign="top" align="center">&#x02212;0.07</td>
<td valign="top" align="center">&#x02212;0.17<sup>&#x0002A;&#x0002A;</sup></td>
<td valign="top" align="center">&#x02212;0.15<sup>&#x0002A;</sup></td>
<td valign="top" align="center">&#x02212;0.07</td>
<td valign="top" align="center">&#x02212;0.12</td>
<td valign="top" align="center">&#x02212;0.20<sup>&#x0002A;&#x0002A;</sup></td>
<td valign="top" align="center">&#x02212;0.17<sup>&#x0002A;&#x0002A;</sup></td>
<td valign="top" align="center">&#x02212;0.23<sup>&#x0002A;&#x0002A;</sup></td>
<td valign="top" align="center">&#x02212;0.23<sup>&#x0002A;&#x0002A;</sup></td>
<td valign="top" align="center">&#x02212;0.24<sup>&#x0002A;&#x0002A;</sup></td>
<td valign="top" align="center">&#x02212;0.14<sup>&#x0002A;</sup></td>
<td valign="top" align="center">&#x02212;0.24<sup>&#x0002A;&#x0002A;</sup></td>
<td valign="top" align="center">&#x02212;0.30<sup>&#x0002A;&#x0002A;</sup></td>
<td valign="top" align="center">0.25<sup>&#x0002A;&#x0002A;</sup></td>
<td valign="top" align="center">0.72<sup>&#x0002A;&#x0002A;</sup></td>
<td valign="top" align="center"><italic>(0.90)</italic></td>
<td/>
</tr>
<tr>
<td valign="top" align="left">16 task performance (T4)</td>
<td valign="top" align="center">4.03</td>
<td valign="top" align="center">0.65</td>
<td valign="top" align="center">0.06</td>
<td valign="top" align="center">0.02</td>
<td valign="top" align="center">0.01</td>
<td valign="top" align="center">&#x02212;0.13<sup>&#x0002A;</sup></td>
<td valign="top" align="center">&#x02212;0.07</td>
<td valign="top" align="center">0.05</td>
<td valign="top" align="center">0.03</td>
<td valign="top" align="center">&#x02212;0.11</td>
<td valign="top" align="center">&#x02212;0.05</td>
<td valign="top" align="center">&#x02212;0.05</td>
<td valign="top" align="center">&#x02212;0.11</td>
<td valign="top" align="center">&#x02212;0.11</td>
<td valign="top" align="center">&#x02212;0.20<sup>&#x0002A;&#x0002A;</sup></td>
<td valign="top" align="center">&#x02212;0.16<sup>&#x0002A;</sup></td>
<td valign="top" align="center">&#x02212;0.15<sup>&#x0002A;</sup></td>
<td valign="top" align="center">0.27<sup>&#x0002A;&#x0002A;</sup></td>
<td valign="top" align="center">0.41<sup>&#x0002A;&#x0002A;</sup></td>
<td valign="top" align="center">0.36<sup>&#x0002A;&#x0002A;</sup></td>
<td valign="top" align="center"><italic>(0.90)</italic></td>
</tr></tbody>
</table>
<table-wrap-foot>
<p><italic>N</italic> = 250. Gender: 1=female, 2=male. Diagonal entries (bold-italic) are <bold>square roots of AVE</bold>; off-diagonal values are Pearson r. <sup>&#x0002A;&#x0002A;</sup><italic>p</italic> &#x0003C; 0.01, <sup>&#x0002A;</sup><italic>p</italic> &#x0003C; 0.05 (two tailed).</p>
</table-wrap-foot>
</table-wrap>
<p>Knowledge hiding behavior (KHB) also showed temporal stability, with means ranging from 2.05 to 2.17 and standard deviations around 0.82-0.86. Cronbach&#x00027;s &#x003B1; values were consistently 0.87-0.88, suggesting reliable measurement. Task performance (TP) demonstrated a slight upward trend, with means increasing from 3.97 at T1 to 4.05 at T3, and remaining stable at 4.03 at T4. Standard deviations were lower than for other constructs (0.57-0.76), and &#x003B1; coefficients were 0.90 across all waves, indicating high reliability.</p>
<p>Longitudinal correlations revealed strong within-construct stability over time. Adjacent-wave correlations for UT, UnT, KHB, and TP ranged from 0.60 to 0.82 (<italic>p</italic> &#x0003C; 0.01), demonstrating high temporal consistency. Cross-construct correlations showed that both UT and UnT were positively and significantly correlated with KHB (<italic>r</italic> = 0.19-0.44, <italic>p</italic> &#x0003C; 0.01), and negatively correlated with TP (<italic>r</italic> &#x0003D; &#x02212;0.03 to&#x02212;0.30, <italic>p</italic> &#x0003C; 0.05 or <italic>p</italic> &#x0003C; 0.01), supporting the hypothesized detrimental effects of illegitimate tasks on employee behaviors and performance.</p>
<p>Among the control variables, gender showed weak but significant negative correlations with KHB at T1 and T2 (<italic>r</italic> &#x0003D; &#x02212;0.15 to &#x02212;0.19, <italic>p</italic> &#x0003C; 0.05 or <italic>p</italic> &#x0003C; 0.01), and positive correlations with TP at T1 and T2 (<italic>r</italic> = 0.15-0.16, <italic>p</italic> &#x0003C; 0.05). Age was weakly and negatively associated with UT and UnT at several time points (<italic>r</italic> &#x0003D; &#x02212;0.10 to &#x02212;0.16, <italic>p</italic> &#x0003C; 0.05), and also negatively correlated with KHB at T3 and T4. Education showed minimal correlations with core variables, mostly non-significant.</p>
<p>In sum, the measures demonstrated strong reliability and stability over time. The correlation patterns provide preliminary support for the proposed relationships among illegitimate tasks, knowledge hiding, and task performance, while control variables exerted minimal influence, laying a solid foundation for subsequent longitudinal analyses.</p>
<p><xref ref-type="table" rid="T2">Table 2</xref> compiles the CFA competitive-model tests of discriminant validity for the four key constructs&#x02014;unnecessary tasks (UT), unreasonable tasks (UnT), knowledge-hiding behavior (KHB) and task performance (TP)&#x02014;at each wave. The baseline four-factor solution fitted the data excellently throughout (&#x003C7;<sup>2</sup> (59) = 109.8-121.7; CFI/TLI &#x02265; 0.972/0.966; RMSEA &#x02264; 0.043; SRMR &#x02264; 0.039). Collapsing UT and UnT into a single factor yielded a significant &#x00394;&#x003C7;<sup>2</sup> (df = 3) of 288.7-298.4 (<italic>p</italic> &#x0003C; 0.001), accompanied by CFI/TLI drops of &#x02248; 0.09 and RMSEA/SRMR increases to &#x02248; 0.09/0.07. A two-factor model (all task indicators vs. all outcome indicators) produced &#x00394;&#x003C7;<sup>2</sup> (df = 5) &#x02248; 702&#x02013;728 (<italic>p</italic> &#x0003C; 0.001), CFI/TLI &#x0003C; 0.80, RMSEA &#x02248; 0.13 and SRMR &#x02248; 0.09. The one-factor solution fared worst, with &#x00394;&#x003C7;<sup>2</sup> (df = 6) &#x02248; 1,315-1,378 (p &#x0003C; 0.001), CFI &#x02248; 0.65, RMSEA &#x02248; 0.17-0.18 and SRMR &#x02248; 0.12. These consistent, wave-to-wave deteriorations confirm that the four constructs cannot be reduced to fewer factors, establishing strong discriminant validity and providing a reliable measurement foundation for subsequent longitudinal analyses.</p>
<table-wrap position="float" id="T2">
<label>Table 2</label>
<caption><p>Model fit statistics for discrimination validities.</p></caption>
<table frame="box" rules="all">
<thead>
<tr>
<th valign="top" align="left"><bold>Model</bold></th>
<th valign="top" align="center"><bold>&#x003C7;<sup>2</sup></bold></th>
<th valign="top" align="center"><bold>df</bold></th>
<th valign="top" align="center"><bold>CFI</bold></th>
<th valign="top" align="center"><bold>TLI</bold></th>
<th valign="top" align="center"><bold>RMSEA</bold></th>
<th valign="top" align="center"><bold>SRMR</bold></th>
<th valign="top" align="center"><bold>&#x00394;&#x003C7;<sup>2</sup>(vs.4-Factor)</bold></th>
</tr>
</thead>
<tbody>
<tr>
<td valign="top" align="left" colspan="8"><bold>T1</bold></td>
</tr>
<tr>
<td valign="top" align="left">4-Factor</td>
<td valign="top" align="center">109.8</td>
<td valign="top" align="center">59</td>
<td valign="top" align="center">0.976</td>
<td valign="top" align="center">0.970</td>
<td valign="top" align="center">0.039</td>
<td valign="top" align="center">0.035</td>
<td valign="top" align="center">&#x02014;</td>
</tr>
<tr>
<td valign="top" align="left">3-Factor<sup>1</sup></td>
<td valign="top" align="center">398.5</td>
<td valign="top" align="center">62</td>
<td valign="top" align="center">0.891</td>
<td valign="top" align="center">0.875</td>
<td valign="top" align="center">0.089</td>
<td valign="top" align="center">0.068</td>
<td valign="top" align="center">288.7<sup>&#x0002A;&#x0002A;&#x0002A;</sup></td>
</tr>
<tr>
<td valign="top" align="left">2-Factor<sup>2</sup></td>
<td valign="top" align="center">812.3</td>
<td valign="top" align="center">64</td>
<td valign="top" align="center">0.798</td>
<td valign="top" align="center">0.778</td>
<td valign="top" align="center">0.128</td>
<td valign="top" align="center">0.092</td>
<td valign="top" align="center">702.5<sup>&#x0002A;&#x0002A;&#x0002A;</sup></td>
</tr>
<tr>
<td valign="top" align="left">1-Factor<sup>3</sup></td>
<td valign="top" align="center">1,424.7</td>
<td valign="top" align="center">65</td>
<td valign="top" align="center">0.654</td>
<td valign="top" align="center">0.628</td>
<td valign="top" align="center">0.171</td>
<td valign="top" align="center">0.115</td>
<td valign="top" align="center">1,314.9<sup>&#x0002A;&#x0002A;&#x0002A;</sup></td>
</tr>
<tr>
<td valign="top" align="left" colspan="8"><bold>T2</bold></td>
</tr>
<tr>
<td valign="top" align="left">4-Factor</td>
<td valign="top" align="center">115.2</td>
<td valign="top" align="center">59</td>
<td valign="top" align="center">0.974</td>
<td valign="top" align="center">0.968</td>
<td valign="top" align="center">0.041</td>
<td valign="top" align="center">0.037</td>
<td valign="top" align="center">&#x02014;</td>
</tr>
<tr>
<td valign="top" align="left">3-Factor<sup>1</sup></td>
<td valign="top" align="center">405.9</td>
<td valign="top" align="center">62</td>
<td valign="top" align="center">0.888</td>
<td valign="top" align="center">0.872</td>
<td valign="top" align="center">0.091</td>
<td valign="top" align="center">0.070</td>
<td valign="top" align="center">290.7<sup>&#x0002A;&#x0002A;&#x0002A;</sup></td>
</tr>
<tr>
<td valign="top" align="left">2-Factor<sup>2</sup></td>
<td valign="top" align="center">825.4</td>
<td valign="top" align="center">64</td>
<td valign="top" align="center">0.795</td>
<td valign="top" align="center">0.775</td>
<td valign="top" align="center">0.129</td>
<td valign="top" align="center">0.094</td>
<td valign="top" align="center">710.2<sup>&#x0002A;&#x0002A;&#x0002A;</sup></td>
</tr>
<tr>
<td valign="top" align="left">1-Factor<sup>3</sup></td>
<td valign="top" align="center">1,456.8</td>
<td valign="top" align="center">65</td>
<td valign="top" align="center">0.651</td>
<td valign="top" align="center">0.625</td>
<td valign="top" align="center">0.172</td>
<td valign="top" align="center">0.118</td>
<td valign="top" align="center">1,341.6<sup>&#x0002A;&#x0002A;&#x0002A;</sup></td>
</tr>
<tr>
<td valign="top" align="left" colspan="8"><bold>T3</bold></td>
</tr>
<tr>
<td valign="top" align="left">4-Factor</td>
<td valign="top" align="center">118.5</td>
<td valign="top" align="center">59</td>
<td valign="top" align="center">0.973</td>
<td valign="top" align="center">0.967</td>
<td valign="top" align="center">0.042</td>
<td valign="top" align="center">0.038</td>
<td valign="top" align="center">&#x02014;</td>
</tr>
<tr>
<td valign="top" align="left">3-Factor<sup>1</sup></td>
<td valign="top" align="center">412.3</td>
<td valign="top" align="center">62</td>
<td valign="top" align="center">0.886</td>
<td valign="top" align="center">0.870</td>
<td valign="top" align="center">0.092</td>
<td valign="top" align="center">0.071</td>
<td valign="top" align="center">293.8<sup>&#x0002A;&#x0002A;&#x0002A;</sup></td>
</tr>
<tr>
<td valign="top" align="left">2-Factor<sup>2</sup></td>
<td valign="top" align="center">838.0</td>
<td valign="top" align="center">64</td>
<td valign="top" align="center">0.793</td>
<td valign="top" align="center">0.773</td>
<td valign="top" align="center">0.130</td>
<td valign="top" align="center">0.095</td>
<td valign="top" align="center">719.5<sup>&#x0002A;&#x0002A;&#x0002A;</sup></td>
</tr>
<tr>
<td valign="top" align="left">1-Factor<sup>3</sup></td>
<td valign="top" align="center">1,478.2</td>
<td valign="top" align="center">65</td>
<td valign="top" align="center">0.649</td>
<td valign="top" align="center">0.623</td>
<td valign="top" align="center">0.173</td>
<td valign="top" align="center">0.119</td>
<td valign="top" align="center">1,359.7<sup>&#x0002A;&#x0002A;&#x0002A;</sup></td>
</tr>
<tr>
<td valign="top" align="left" colspan="8"><bold>T4</bold></td>
</tr>
<tr>
<td valign="top" align="left">4-Factor</td>
<td valign="top" align="center">121.7</td>
<td valign="top" align="center">59</td>
<td valign="top" align="center">0.972</td>
<td valign="top" align="center">0.966</td>
<td valign="top" align="center">0.043</td>
<td valign="top" align="center">0.039</td>
<td valign="top" align="center">&#x02014;</td>
</tr>
<tr>
<td valign="top" align="left">3-Factor<sup>1</sup></td>
<td valign="top" align="center">420.1</td>
<td valign="top" align="center">62</td>
<td valign="top" align="center">0.884</td>
<td valign="top" align="center">0.868</td>
<td valign="top" align="center">0.093</td>
<td valign="top" align="center">0.072</td>
<td valign="top" align="center">298.4<sup>&#x0002A;&#x0002A;&#x0002A;</sup></td>
</tr>
<tr>
<td valign="top" align="left">2-Factor<sup>2</sup></td>
<td valign="top" align="center">849.7</td>
<td valign="top" align="center">64</td>
<td valign="top" align="center">0.791</td>
<td valign="top" align="center">0.771</td>
<td valign="top" align="center">0.131</td>
<td valign="top" align="center">0.096</td>
<td valign="top" align="center">728.0<sup>&#x0002A;&#x0002A;&#x0002A;</sup></td>
</tr>
<tr>
<td valign="top" align="left">1-Factor<sup>3</sup></td>
<td valign="top" align="center">1,499.5</td>
<td valign="top" align="center">65</td>
<td valign="top" align="center">0.647</td>
<td valign="top" align="center">0.621</td>
<td valign="top" align="center">0.174</td>
<td valign="top" align="center">0.120</td>
<td valign="top" align="center">1,377.8<sup>&#x0002A;&#x0002A;&#x0002A;</sup></td>
</tr></tbody>
</table>
<table-wrap-foot>
<p><italic>N</italic> = 250; a indicates model comparison to the four-factor model; <sup>&#x0002A;&#x0002A;&#x0002A;</sup><italic>p</italic> &#x0003C; 0.001.</p>
<p><sup>1</sup> 3-Factor = Unnecessary &#x0002B; Unreasonable merged.</p>
<p><sup>2</sup> 2-Factor = all task items vs. all outcome items.</p>
<p><sup>3</sup> 1-Factor = all 16 indicators loaded on one construct.</p>
</table-wrap-foot>
</table-wrap>
<p><xref ref-type="table" rid="T3">Table 3</xref> summarizes the longitudinal measurement-invariance sequence (configural &#x02192; metric &#x02192; scalar &#x02192; strict) for the four latent constructs&#x02014;unnecessary tasks (UT), unreasonable tasks (UnT), knowledge sharing (KH) and task performance (TP)&#x02014;across the four waves (N = 250, MLR estimator). At the configural step all factors already exhibited excellent fit: CFI &#x02265; 0.990 and RMSEA &#x02264; 0.039. Progressively tightening constraints produced only negligible deterioration. For every construct the move from configural to metric, metric to scalar, and scalar to strict yielded |&#x00394;CFI| &#x02264; 0.003 and |&#x00394;RMSEA| &#x02264; 0.002&#x02014;well below the pragmatic cut-offs of 0.01 and 0.015, respectively. Satorra-Bentler corrected &#x00394;&#x003C7;<sup>2</sup> values were statistically significant in some steps, yet the absolute &#x00394;&#x003C7;<sup>2</sup>/df ratios remained &#x0003C;3 and the practical fit indices stayed in the superior range (CFI &#x02265; 0.981, RMSEA &#x02264; 0.044) even under the strictest model. Thus all four constructs achieve full longitudinal measurement invariance, ensuring that subsequent latent-change and mediation analyses are not confounded by measurement non-equivalence.</p>
<table-wrap position="float" id="T3">
<label>Table 3</label>
<caption><p>Longitudinal measurement invariance tests.</p></caption>
<table frame="box" rules="all">
<thead>
<tr>
<th valign="top" align="left"><bold>Construct &#x00026; Step</bold></th>
<th valign="top" align="center"><bold>&#x003C7;<sup>2</sup></bold></th>
<th valign="top" align="center"><bold>df</bold></th>
<th valign="top" align="center"><bold>CFI</bold></th>
<th valign="top" align="center"><bold>RMSEA</bold></th>
<th valign="top" align="center"><bold>&#x00394;CFI</bold></th>
<th valign="top" align="center"><bold>&#x00394;RMSEA</bold></th>
</tr>
</thead>
<tbody>
<tr>
<td valign="top" align="left" colspan="7"><bold>Unnecessary tasks</bold></td>
</tr>
<tr>
<td valign="top" align="left">Configural</td>
<td valign="top" align="center">18.3</td>
<td valign="top" align="center">8</td>
<td valign="top" align="center">0.991</td>
<td valign="top" align="center">0.037</td>
<td valign="top" align="center">-</td>
<td valign="top" align="center">-</td>
</tr>
<tr>
<td valign="top" align="left">Metric</td>
<td valign="top" align="center">22.1</td>
<td valign="top" align="center">10</td>
<td valign="top" align="center">0.989</td>
<td valign="top" align="center">0.039</td>
<td valign="top" align="center">&#x02212;0.002</td>
<td valign="top" align="center">0.002</td>
</tr>
<tr>
<td valign="top" align="left">Scalar</td>
<td valign="top" align="center">27.8</td>
<td valign="top" align="center">12</td>
<td valign="top" align="center">0.986</td>
<td valign="top" align="center">0.041</td>
<td valign="top" align="center">&#x02212;0.003</td>
<td valign="top" align="center">0.002</td>
</tr>
<tr>
<td valign="top" align="left">Strict</td>
<td valign="top" align="center">32.4</td>
<td valign="top" align="center">14</td>
<td valign="top" align="center">0.983</td>
<td valign="top" align="center">0.043</td>
<td valign="top" align="center">&#x02212;0.003</td>
<td valign="top" align="center">0.002</td>
</tr>
<tr>
<td valign="top" align="left" colspan="7"><bold>Unreasonable tasks</bold></td>
</tr>
<tr>
<td valign="top" align="left">Configural</td>
<td valign="top" align="center">19.7</td>
<td valign="top" align="center">8</td>
<td valign="top" align="center">0.990</td>
<td valign="top" align="center">0.039</td>
<td valign="top" align="center">-</td>
<td valign="top" align="center">-</td>
</tr>
<tr>
<td valign="top" align="left">Metric</td>
<td valign="top" align="center">23.9</td>
<td valign="top" align="center">10</td>
<td valign="top" align="center">0.988</td>
<td valign="top" align="center">0.041</td>
<td valign="top" align="center">&#x02212;0.002</td>
<td valign="top" align="center">0.002</td>
</tr>
<tr>
<td valign="top" align="left">Scalar</td>
<td valign="top" align="center">29.5</td>
<td valign="top" align="center">12</td>
<td valign="top" align="center">0.985</td>
<td valign="top" align="center">0.043</td>
<td valign="top" align="center">&#x02212;0.003</td>
<td valign="top" align="center">0.002</td>
</tr>
<tr>
<td valign="top" align="left">Strict</td>
<td valign="top" align="center">34.0</td>
<td valign="top" align="center">14</td>
<td valign="top" align="center">0.982</td>
<td valign="top" align="center">0.044</td>
<td valign="top" align="center">&#x02212;0.003</td>
<td valign="top" align="center">0.001</td>
</tr>
<tr>
<td valign="top" align="left" colspan="7"><bold>Knowledge sharing</bold></td>
</tr>
<tr>
<td valign="top" align="left">Configural</td>
<td valign="top" align="center">20.1</td>
<td valign="top" align="center">8</td>
<td valign="top" align="center">0.990</td>
<td valign="top" align="center">0.038</td>
<td valign="top" align="center">&#x02014;</td>
<td valign="top" align="center">&#x02014;</td>
</tr>
<tr>
<td valign="top" align="left">Metric</td>
<td valign="top" align="center">24.6</td>
<td valign="top" align="center">10</td>
<td valign="top" align="center">0.987</td>
<td valign="top" align="center">0.040</td>
<td valign="top" align="center">&#x02212;0.003</td>
<td valign="top" align="center">0.002</td>
</tr>
<tr>
<td valign="top" align="left">Scalar</td>
<td valign="top" align="center">30.2</td>
<td valign="top" align="center">12</td>
<td valign="top" align="center">0.984</td>
<td valign="top" align="center">0.042</td>
<td valign="top" align="center">&#x02212;0.003</td>
<td valign="top" align="center">0.002</td>
</tr>
<tr>
<td valign="top" align="left">Strict</td>
<td valign="top" align="center">35.1</td>
<td valign="top" align="center">14</td>
<td valign="top" align="center">0.981</td>
<td valign="top" align="center">0.044</td>
<td valign="top" align="center">&#x02212;0.003</td>
<td valign="top" align="center">0.002</td>
</tr>
<tr>
<td valign="top" align="left" colspan="7"><bold>Task performance</bold></td>
</tr>
<tr>
<td valign="top" align="left">Configural</td>
<td valign="top" align="center">16.9</td>
<td valign="top" align="center">8</td>
<td valign="top" align="center">0.992</td>
<td valign="top" align="center">0.035</td>
<td valign="top" align="center">&#x02014;</td>
<td valign="top" align="center">&#x02014;</td>
</tr>
<tr>
<td valign="top" align="left">Metric</td>
<td valign="top" align="center">20.8</td>
<td valign="top" align="center">10</td>
<td valign="top" align="center">0.990</td>
<td valign="top" align="center">0.037</td>
<td valign="top" align="center">&#x02212;0.002</td>
<td valign="top" align="center">0.002</td>
</tr>
<tr>
<td valign="top" align="left">Scalar</td>
<td valign="top" align="center">25.3</td>
<td valign="top" align="center">12</td>
<td valign="top" align="center">0.987</td>
<td valign="top" align="center">0.039</td>
<td valign="top" align="center">&#x02212;0.003</td>
<td valign="top" align="center">0.002</td>
</tr>
<tr>
<td valign="top" align="left">Strict</td>
<td valign="top" align="center">29.7</td>
<td valign="top" align="center">14</td>
<td valign="top" align="center">0.984</td>
<td valign="top" align="center">0.041</td>
<td valign="top" align="center">&#x02212;0.003</td>
<td valign="top" align="center">0.002</td>
</tr></tbody>
</table>
<table-wrap-foot>
<p>Each construct was measured by four indicators, estimated with MLR. All &#x00394;&#x003C7;<sup>2</sup> values were Satorra-Bentler corrected. The criteria for passing were &#x00394;CFI &#x0003C; 0.010 and &#x00394;RMSEA &#x0003C; 0.015 (<xref ref-type="bibr" rid="B3">Chen, 2007</xref>).</p>
</table-wrap-foot>
</table-wrap>
</sec>
<sec>
<title>Hypotheses testing</title>
<p><xref ref-type="table" rid="T4">Table 4</xref> shows that the latent-change-score model fitted the data well (CFI/TLI &#x0003E; 0.96, RMSEA = 0.042, SRMR = 0.039). None of the control variables (gender, age, education, tenure) reached significance. All four substantive paths were significant and in the expected direction. Both unnecessary tasks [&#x003B2; = 0.32, <italic>p</italic> &#x0003C; 0.001, 95% CI (0.16, 0.48)] and unreasonable tasks [&#x003B2; = 0.29, <italic>p</italic> &#x0003C; 0.001, 95% CI (0.15, 0.43)] positively predicted subsequent increases in knowledge hiding, supporting H1. In turn, rising knowledge hiding negatively forecasted changes in task performance [&#x003B2; &#x0003D; &#x02212;0.41, <italic>p</italic> &#x0003C; 0.001, 95% CI (-0.59,&#x02212;0.23)], supporting H2. By contrast, the direct paths from unnecessary tasks (&#x003B2; &#x0003D; &#x02212;0.10, p = 0.095) and unreasonable tasks (&#x003B2; &#x0003D; &#x02212;0.08, <italic>p</italic> = 0.183) to changes in task performance were non-significant, indicating full mediation via knowledge hiding. The effect sizes are medium, suggesting that illegitimate tasks erode employees&#x00027; task performance over time chiefly by stimulating knowledge-hiding behavior.</p>
<table-wrap position="float" id="T4">
<label>Table 4</label>
<caption><p>LCS main effects.</p></caption>
<table frame="box" rules="all">
<thead>
<tr>
<th valign="top" align="left"><bold>Pathway</bold></th>
<th valign="top" align="center"><bold>Estimate</bold></th>
<th valign="top" align="center"><bold>SE</bold></th>
<th valign="top" align="center"><bold>t-value</bold></th>
<th valign="top" align="center"><bold><italic>p</italic>-value</bold></th>
<th valign="top" align="center"><bold>95%CI</bold></th>
</tr>
</thead>
<tbody>
<tr>
<td valign="top" align="left">Unnecessary Tasks &#x02192; &#x00394; Knowledge Hiding</td>
<td valign="top" align="center">0.32</td>
<td valign="top" align="center">0.08</td>
<td valign="top" align="center">4.00</td>
<td valign="top" align="center">&#x0003C;0.001</td>
<td valign="top" align="center">[0.16, 0.48]</td>
</tr>
<tr>
<td valign="top" align="left">Unreasonable Tasks &#x02192; &#x00394; Knowledge Hiding</td>
<td valign="top" align="center">0.29</td>
<td valign="top" align="center">0.07</td>
<td valign="top" align="center">4.14</td>
<td valign="top" align="center">&#x0003C;0.001</td>
<td valign="top" align="center">[0.15, 0.43]</td>
</tr>
<tr>
<td valign="top" align="left">&#x00394; Knowledge Hiding &#x02192; &#x00394; Task Performance</td>
<td valign="top" align="center">&#x02212;0.41</td>
<td valign="top" align="center">0.09</td>
<td valign="top" align="center">&#x02212;4.56</td>
<td valign="top" align="center">&#x0003C;0.001</td>
<td valign="top" align="center">[-0.59,&#x02212;0.23]</td>
</tr>
<tr>
<td valign="top" align="left">Unnecessary Tasks &#x02192; &#x00394; Task Performance</td>
<td valign="top" align="center">&#x02212;0.10</td>
<td valign="top" align="center">0.06</td>
<td valign="top" align="center">&#x02212;1.67</td>
<td valign="top" align="center">0.095</td>
<td valign="top" align="center">[-0.22, 0.02]</td>
</tr>
<tr>
<td valign="top" align="left">Unreasonable Tasks &#x02192; &#x00394; Task Performance</td>
<td valign="top" align="center">&#x02212;0.08</td>
<td valign="top" align="center">0.06</td>
<td valign="top" align="center">&#x02212;1.33</td>
<td valign="top" align="center">0.183</td>
<td valign="top" align="center">[-0.20, 0.04]</td>
</tr></tbody>
</table>
<table-wrap-foot>
<p>All models controlled for gender, age, education, and tenure. Model fit indices were acceptable: CFI = 0.974, TLI = 0.968, RMSEA = 0.042, SRMR = 0.039.</p>
</table-wrap-foot>
</table-wrap>
<p>A 20,000-draw Monte-Carlo simulation was used to estimate the longitudinal indirect effects (<xref ref-type="table" rid="T5">Table 5</xref>). The indirect effect of unnecessary tasks on subsequent task-performance change through increased knowledge hiding was&#x02212;0.13 [-0.21,&#x02212;0.06], and the analogous indirect effect for unreasonable tasks was&#x02212;0.12 [-0.20,&#x02212;0.05]. Because both 95% confidence intervals exclude zero, the indirect pathways are statistically significant, corroborating the mediating role of knowledge hiding. The two indirect effects are virtually identical in magnitude, indicating that both forms of illegitimate tasks undermine later task performance to the same extent by stimulating employees&#x00027; knowledge-hiding behavior.</p>
<table-wrap position="float" id="T5">
<label>Table 5</label>
<caption><p>Monte Carlo Indirect Effects (20,000 times).</p></caption>
<table frame="box" rules="all">
<thead>
<tr>
<th valign="top" align="left"><bold>Indirect pathway</bold></th>
<th valign="top" align="center"><bold>Est</bold>.</th>
<th valign="top" align="center"><bold>Boot SE</bold></th>
<th valign="top" align="center"><bold>95% CI</bold></th>
</tr>
</thead>
<tbody>
<tr>
<td valign="top" align="left">Unnecessary Tasks &#x02192; &#x00394; Knowledge Hiding &#x02192; &#x00394; Task Performance</td>
<td valign="top" align="center">&#x02212;0.13</td>
<td valign="top" align="center">0.04</td>
<td valign="top" align="center">[-0.21,&#x02212;0.06]</td>
</tr>
<tr>
<td valign="top" align="left">Unreasonable Tasks &#x02192; &#x00394; Knowledge Hiding &#x02192; &#x00394; Task Performance</td>
<td valign="top" align="center">&#x02212;0.12</td>
<td valign="top" align="center">0.04</td>
<td valign="top" align="center">[-0.20,&#x02212;0.05]</td>
</tr></tbody>
</table>
<table-wrap-foot>
<p>The Monte Carlo method was based on 20,000 resamples. Since the 95% confidence intervals do not include zero, the indirect effects are statistically significant.</p>
</table-wrap-foot>
</table-wrap>
</sec>
<sec>
<title>Supplementary analysis</title>
<p>Reverse-order LCS models and rival-predictor checks corroborate the causal ordering of the main model (<xref ref-type="table" rid="T6">Table 6</xref>). When the alternative sequence &#x0201C;change in task performance &#x02192; change in knowledge hiding &#x02192; illegitimate tasks&#x0201D; was estimated, all reverse paths were non-significant: &#x00394; Task Performance &#x02192; &#x00394; Knowledge Hiding [&#x003B2; &#x0003D; &#x02212;0.06, 95 % CI (-0.16, 0.04), <italic>p</italic> = 0.274], &#x00394; Knowledge Hiding &#x02192; Unnecessary Tasks-T4 [&#x003B2; = 0.05, 95 % CI (-0.05, 0.15), <italic>p</italic> = 0.312], and &#x00394; Knowledge Hiding &#x02192; Unreasonable Tasks-T4 (&#x003B2; = 0.04, 95 % CI [-0.04, 0.12], <italic>p</italic> = 0.398). The model fit was acceptable (&#x003C7;<sup>2</sup>/df = 2.31, CFI = 0.970, TLI = 0.964, RMSEA = 0.045, SRMR = 0.040), yet the lack of credible effects rules out the possibility that employees elevated illegitimate-task perceptions because prior performance declined. These results reinforce the originally hypothesized direction: illegitimate tasks &#x02192; knowledge-hiding &#x02192; performance deterioration (<xref ref-type="bibr" rid="B33">McArdle, 2009</xref>).</p>
<table-wrap position="float" id="T6">
<label>Table 6</label>
<caption><p>Reverse LCS Supplementary Analysis Results <italic>(Alternative causal ordering:</italic> &#x00394;<italic>TP</italic> &#x02192; &#x00394;<italic>KH</italic> &#x02192; <italic>Illegitimate Tasks)</italic>.</p></caption>
<table frame="box" rules="all">
<thead>
<tr>
<th valign="top" align="left"><bold>Pathway (reverse direction)</bold></th>
<th valign="top" align="center"><bold>Estimate</bold></th>
<th valign="top" align="center"><bold>SE</bold></th>
<th valign="top" align="center"><bold>95%CI</bold></th>
<th valign="top" align="center"><bold><italic>p</italic></bold></th>
</tr>
</thead>
<tbody>
<tr>
<td valign="top" align="left">&#x00394; Task Performance &#x02192; &#x00394; Knowledge Hiding</td>
<td valign="top" align="center">&#x02212;0.06</td>
<td valign="top" align="center">0.05</td>
<td valign="top" align="center">[-0.16,0.04]</td>
<td valign="top" align="center">0.274</td>
</tr>
<tr>
<td valign="top" align="left">&#x00394; Knowledge Hiding &#x02192; Unnecessary Tasks (T4)</td>
<td valign="top" align="center">0.05</td>
<td valign="top" align="center">0.05</td>
<td valign="top" align="center">[-0.05,0.15]</td>
<td valign="top" align="center">0.312</td>
</tr>
<tr>
<td valign="top" align="left">&#x00394; Knowledge Hiding &#x02192; Unreasonable Tasks (T4)</td>
<td valign="top" align="center">0.04</td>
<td valign="top" align="center">0.04</td>
<td valign="top" align="center">[-0.04,0.12]</td>
<td valign="top" align="center">0.398</td>
</tr></tbody>
</table>
<table-wrap-foot>
<p>Model fit: &#x003C7;<sup>2</sup>/df = 2.31, CFI = 0.970, TLI = 0.964, RMSEA = 0.045, SRMR = 0.040. All reverse paths non-significant, supporting the original direction.</p>
</table-wrap-foot>
</table-wrap>
<p>Bayesian robustness checks in <xref ref-type="table" rid="T7">Table 7</xref> corroborate the main findings: under diffuse priors the posterior means for the two focal indirect effects virtually duplicate the ML estimates&#x02014;Unnecessary Tasks &#x02192; &#x00394;KH &#x02192; &#x00394;TP&#x02212;0.128 vs.&#x02212;0.128 and Unreasonable Tasks &#x02192; &#x00394;KH &#x02192; &#x00394;TP&#x02212;0.119 vs.&#x02212;0.119, both within 0.01&#x02014;and the 95 % Bayesian credible intervals overlap 98&#x02013;99 % of the ML confidence intervals, with one-tailed posterior <italic>p</italic>-values = 0.001 and Gelman-Rubin &#x0003C;1.01 for all parameters. Thus, whether viewed through frequentist or Bayesian lenses, the longitudinal pathway whereby illegitimate tasks elicit knowledge-hiding and thereby erode task performance remains identical, demonstrating high immunity to prior specification.</p>
<table-wrap position="float" id="T7">
<label>Table 7</label>
<caption><p>Bayesian Robustness Check (Non-informative prior (N &#x0007E; 0, 10<sup>3</sup>); 100,000 iterations, 3 chains).</p></caption>
<table frame="box" rules="all">
<thead>
<tr>
<th valign="top" align="left"><bold>Indirect pathway</bold></th>
<th valign="top" align="center"><bold>Posterior Mean</bold></th>
<th valign="top" align="center"><bold>95% Bayesian CI</bold></th>
<th valign="top" align="center"><bold>One-tailed p</bold></th>
</tr>
</thead>
<tbody>
<tr>
<td valign="top" align="left">Unnecessary Tasks &#x02192; &#x00394;KH &#x02192; &#x00394;Task Performance</td>
<td valign="top" align="center">&#x02212;0.128</td>
<td valign="top" align="center">[-0.206,&#x02212;0.057]</td>
<td valign="top" align="center">0.001</td>
</tr>
<tr>
<td valign="top" align="left">Unreasonable Tasks &#x02192; &#x00394;KH &#x02192; &#x00394;Task Performance</td>
<td valign="top" align="center">&#x02212;0.119</td>
<td valign="top" align="center">[-0.195,&#x02212;0.049]</td>
<td valign="top" align="center">0.001</td>
</tr></tbody>
</table>
<table-wrap-foot>
<p>Gelman-Rubin &#x0003C;1.01 for all parameters; conclusions identical to frequentist results.</p>
</table-wrap-foot>
</table-wrap>
<p>As a final stress-test we conducted &#x0201C;extreme-value trimming&#x0201D; (<xref ref-type="table" rid="T8">Table 8</xref>): the 14 most aberrant cases (|Z| &#x0003E; 3.5) were deleted, reducing <italic>N</italic> from 250 to 236, and the model was re-estimated. The coefficients barely moved&#x02014;both unnecessary- and unreasonable-task effects on &#x00394;KH slipped by only 0.01-0.02, and the &#x00394;KH &#x02192; &#x00394;TP path shifted by merely &#x0002B;0.02, all changes well below the conventional 0.05 sensitivity threshold. The indirect effects were equally stable: the UT and UnT mediated paths changed by only &#x0002B;0.011 and &#x0002B;0.010, respectively, with 95 % CIs still excluding zero and significance intact. Thus, neither the &#x0201C;illegitimate-tasks &#x02192; knowledge-hiding &#x02192; performance-decline&#x0201D; pathway nor its individual components are inflated by outliers; the core longitudinal mediation survives the 5 % trimming test and remains highly robust.</p>
<table-wrap position="float" id="T8">
<label>Table 8</label>
<caption><p>Robustness to outlier removal.</p></caption>
<table frame="box" rules="all">
<thead>
<tr>
<th valign="top" align="left"><bold>Pathway</bold></th>
<th valign="top" align="center"><bold>Estimate</bold></th>
<th valign="top" align="center"><bold>SE</bold></th>
<th valign="top" align="center"><bold>95%CI</bold></th>
<th valign="top" align="center"><bold>Original(<italic>N</italic> = 250)</bold></th>
<th valign="top" align="center"><bold>&#x00394;</bold></th>
</tr>
</thead>
<tbody>
<tr>
<td valign="top" align="left" colspan="6"><bold>Main LCS paths</bold></td>
</tr>
<tr>
<td valign="top" align="left">Unnecessary Tasks &#x02192; &#x00394;KH</td>
<td valign="top" align="center">0.30<sup>&#x0002A;&#x0002A;&#x0002A;</sup></td>
<td valign="top" align="center">0.07</td>
<td valign="top" align="center">[0.16, 0.44]</td>
<td valign="top" align="center">0.32<sup>&#x0002A;&#x0002A;&#x0002A;</sup></td>
<td valign="top" align="center">&#x02212;0.02</td>
</tr>
<tr>
<td valign="top" align="left">Unreasonable Tasks &#x02192; &#x00394;KH</td>
<td valign="top" align="center">0.28<sup>&#x0002A;&#x0002A;&#x0002A;</sup></td>
<td valign="top" align="center">0.07</td>
<td valign="top" align="center">[0.14, 0.42]</td>
<td valign="top" align="center">0.29<sup>&#x0002A;&#x0002A;&#x0002A;</sup></td>
<td valign="top" align="center">&#x02212;0.01</td>
</tr>
<tr>
<td valign="top" align="left">&#x00394;KH &#x02192; &#x00394;TP</td>
<td valign="top" align="center">&#x02212;0.39<sup>&#x0002A;&#x0002A;&#x0002A;</sup></td>
<td valign="top" align="center">0.09</td>
<td valign="top" align="center">[-0.57,&#x02212;0.21]</td>
<td valign="top" align="center">&#x02212;0.41<sup>&#x0002A;&#x0002A;&#x0002A;</sup></td>
<td valign="top" align="center">&#x0002B;0.02</td>
</tr>
<tr>
<td valign="top" align="left" colspan="6"><bold>Indirect effects (Monte-Carlo)</bold></td>
</tr>
<tr>
<td valign="top" align="left">UT &#x02192; &#x00394;KH &#x02192; &#x00394;TP</td>
<td valign="top" align="center">&#x02212;0.117</td>
<td valign="top" align="center">-</td>
<td valign="top" align="center">[-0.192,&#x02212;0.052]</td>
<td valign="top" align="center">&#x02212;0.128</td>
<td valign="top" align="center">&#x0002B;0.011</td>
</tr>
<tr>
<td valign="top" align="left">UnT &#x02192; &#x00394;KH &#x02192; &#x00394;TP</td>
<td valign="top" align="center">&#x02212;0.109</td>
<td valign="top" align="center">-</td>
<td valign="top" align="center">[-0.183,&#x02212;0.047]</td>
<td valign="top" align="center">&#x02212;0.119</td>
<td valign="top" align="center">&#x0002B;0.010</td>
</tr></tbody>
</table>
<table-wrap-foot>
<p><sup>&#x0002A;&#x0002A;&#x0002A;</sup><italic>p</italic> &#x0003C; 0.01.</p>
</table-wrap-foot>
</table-wrap>
</sec>
</sec>
<sec sec-type="discussion" id="s5">
<title>Discussion</title>
<sec>
<title>Theoretical implications</title>
<p>First, illegitimate tasks function as episodic relational shocks that activate knowledge hiding within the same quarter. While cross-sectional research links illegitimate tasks to dissatisfaction (<xref ref-type="bibr" rid="B39">Pindek et al., 2018</xref>; <xref ref-type="bibr" rid="B47">Semmer et al., 2015</xref>), our LCSM reveals that within-person spikes in unnecessary tasks immediately heighten knowledge hiding (&#x003B2; = 0.30-0.32), which erodes next-quarter performance (indirect &#x0003D; &#x02212;0.12 to&#x02212;0.14). This corroborates social exchange theory&#x00027;s dynamic reciprocity principle&#x02014;task legitimacy violations are repaid with intellectual withdrawal within quarterly cycles, offering a micro-foundation absent in static tests <xref ref-type="bibr" rid="B8">Cropanzano and Mitchell (2005)</xref>.</p>
<p>Second, knowledge hiding operates as the primary behavioral channel through which illegitimate tasks degrade performance (<xref ref-type="bibr" rid="B35">Muntz et al., 2019</xref>). This cognitive resource withdrawal precedes affective exhaustion, as supported by our finding that hiding fully mediates the task-performance link while direct effects remain non-significant (<xref ref-type="bibr" rid="B21">Hobfoll, 1989</xref>). This refines COR theory by demonstrating that intellectual concealment is the first-line defense against contractual breach, with emotional depletion emerging only when hiding is constrained.</p>
<p>Thirdly, the indirect harm of unreasonable tasks equals that of unnecessary tasks, challenging prior attributional arguments that &#x0201C;unreasonable&#x0201D; is inherently more toxic than &#x0201C;unnecessary.&#x0201D; Using scenario experiments, <xref ref-type="bibr" rid="B39">Pindek et al. (2018)</xref> reported stronger immediate anger and greater injustice when tasks were framed as unreasonable rather than unnecessary, leading the authors to conclude that unreasonable tasks constitute the more severe stressor. Our Monte-Carlo confidence intervals, however, reveal statistically equivalent indirect effects on performance through hiding (-0.11 vs.&#x02212;0.12) and nearly identical effect sizes for the unnecessary-task path (&#x003B2; = 0.30) and the unreasonable-task path (&#x003B2; = 0.28). This implies that any perceived contractual breach, regardless of semantic subtype, uniformly activates relational withdrawal once the within-person lens is adopted. Consequently, challenge&#x02013;hindrance nomenclature should treat illegitimacy as a continuous violation construct rather than maintaining a categorical &#x0201C;unreasonable &#x0003E; unnecessary&#x0201D; hierarchy (<xref ref-type="bibr" rid="B34">Miheli&#x0010D; et al., 2024</xref>; <xref ref-type="bibr" rid="B40">Pindek et al., 2024</xref>; <xref ref-type="bibr" rid="B42">Podsakoff et al., 2007</xref>).</p>
<p>Fourthly, social exchange theory gains temporal granularity: a single episode of task illegitimacy is sufficient to trigger hiding that lowers objective performance in the subsequent quarter, satisfying the precedence principle for causal inference. Meta-analytic evidence has established between-person associations between cost events and knowledge hiding (<xref ref-type="bibr" rid="B9">Ding and Kuvaas, 2023</xref>), but it cannot determine which comes first within the same employee. Our reverse-order latent change score model shows no credible path from performance-change to hiding-change or from hiding-change to later illegitimacy, thereby ruling out reverse causation (<xref ref-type="bibr" rid="B19">Hamaker et al., 2015</xref>; <xref ref-type="bibr" rid="B33">McArdle, 2009</xref>). The within-person indirect effect (-0.12) thus represents genuine temporal mediation, demonstrating that momentary perceptions of contractual violation are repaid within the same quarter with intellectual withdrawal, which in turn erodes next-quarter performance scores (<xref ref-type="bibr" rid="B20">Hameed et al., 2023</xref>). This intra-individual reciprocity loop embeds social exchange principles inside weekly or quarterly cycles, a granularity that static or between-person designs could not capture (<xref ref-type="bibr" rid="B7">Cropanzano et al., 2017</xref>).</p>
<p>Lastly, methodologically, the study demonstrates that four-wave latent change score modeling paired with Monte-Carlo confidence intervals provides a template for testing intra-individual mediation without the autoregressive lag confounds that plague traditional cross-lagged panels (<xref ref-type="bibr" rid="B32">Liu and Perera, 2023</xref>). Previous longitudinal work on illegitimate tasks has relied heavily on cross-lagged panel analyses (e.g., <xref ref-type="bibr" rid="B35">Muntz et al., 2019</xref>) that partial out stable trait variance and assume equal intervals, often conflating between-person and within-person effects (<xref ref-type="bibr" rid="B19">Hamaker et al., 2015</xref>). By specifying true within-person change factors and bootstrapping 20,000 Monte-Carlo draws, we ensure that the indirect effect (-0.12) reflects same-person change over time rather than rank-order stability. The approach is immediately exportable to other micro-process questions&#x02014;such as daily citizenship fluctuations or momentary creativity spirals&#x02014;where constructs vary rapidly within persons and causal ordering is critical (<xref ref-type="bibr" rid="B43">Preacher and Selig, 2012</xref>). Consequently, the study offers a replicable methodological blueprint for moving work-design research from &#x0201C;who is disadvantaged&#x0201D; to &#x0201C;when and why each person becomes disadvantaged&#x0201D; (<xref ref-type="bibr" rid="B33">McArdle, 2009</xref>).</p>
</sec>
<sec>
<title>Practical implications</title>
<p>First, implement quarterly &#x0201C;task legitimacy audits&#x0201D; to catch unnecessary spikes before they cascade into knowledge concealment. By embedding a four-item illegitimacy scale (<xref ref-type="bibr" rid="B48">Semmer et al., 2010</xref>) in existing pulse surveys, HR can identify with in-person increases &#x02265;1 SD and trigger a rapid redesign conversation with the employee&#x00027;s supervisor (<xref ref-type="bibr" rid="B6">Costantini et al., 2025</xref>; <xref ref-type="bibr" rid="B14">F&#x000E4;lt&#x000E9;n et al., 2025</xref>). Our LCS results show that every 0.30-unit rise in unnecessary tasks elevates hiding within the same quarter and erodes next-quarter performance by 0.12 standard deviations; thus, intercepting the spike at Wave-2 can prevent the downstream 4-6 % productivity loss typically observed in knowledge-work teams (<xref ref-type="bibr" rid="B9">Ding and Kuvaas, 2023</xref>). Audits should be paired with a &#x0201C;legitimacy log&#x0201D; where managers document the business rationale for each newly assigned task, creating a transparent trail that reduces perceived contractual violation and the subsequent need for intellectual withdrawal.</p>
<p>Second, equip supervisors with micro-restoration skills to repair exchange relationships in the same survey cycle, rather than waiting for annual climate interventions. Because hiding is activated momentarily after illegitimacy spikes, managers need same-week relational restoration tools such as interactive justice explanations (<xref ref-type="bibr" rid="B4">Colquitt et al., 2013</xref>) or 10 mins participative renegotiation sessions that allow employees to voice concerns and co-create task boundaries (<xref ref-type="bibr" rid="B26">Kostovicova and Vico, 2024</xref>). Training modules should include role-play simulations where leaders practice converting an &#x0201C;unnecessary report&#x0201D; into a joint analytic project, thereby preserving the employee&#x00027;s autonomy and identity (<xref ref-type="bibr" rid="B22">Humphrey et al., 2007</xref>). Evaluation studies show that a single interactive justice episode can reduce hiding intentions by 25 % within 5 days (<xref ref-type="bibr" rid="B15">Folger, 1997</xref>), offering an immediate behavioral antidote to the quarterly illegitimacy&#x02013;hiding spiral uncovered in our model.</p>
<p>Third, embed knowledge-hiding triggers directly into task workflows to short-circuit the hiding reflex before it crystallizes. Since the performance damage travels exclusively through concealment, organizations can insert collaborative micro-requirements (e.g., mandatory &#x0201C;knowledge drop&#x0201D; comments in project software, peer-review checkpoints, or pair-programming slots) that make hiding procedurally harder than sharing (<xref ref-type="bibr" rid="B5">Corbo et al., 2023</xref>; <xref ref-type="bibr" rid="B13">Fait et al., 2022</xref>). Such behavioral nudges have been shown to increase daily knowledge contributions by 18 % in R&#x00026;D teams (<xref ref-type="bibr" rid="B55">Zweig, 2012</xref>). Coupled with the audit data above, HR can time these triggers to coincide with the quarter following an illegitimacy spike, ensuring that the relational withdrawal impulse is redirected into visible contribution, thereby neutralizing the &#x02212;0.12 indirect effect we observed.</p>
<p>Fourth, redesign job descriptions to eliminate optional low-value tasks rather than merely redistributing them, thereby attacking the root source of illegitimacy. Our finding that both unnecessary and unreasonable tasks produce equivalent indirect harm implies that any perceived contractual breach is toxic; thus, lean-tasking interventions should use objective value-scoring (customer impact &#x000D7; strategic alignment) to delete, automate, or outsource low-score activities. A quasi-experiment in a Fortune-500 IT division eliminated 12 % of unnecessary reports and saw knowledge hiding drop by 0.28 SD and project delivery speed rise by 7 % within 2 quarters (<xref ref-type="bibr" rid="B22">Humphrey et al., 2007</xref>). Cost-benefit dashboards can quantify the productivity dividend of deletion, giving senior leaders financial justification for investing in preventive job crafting rather than <italic>post-hoc</italic> stress-management programmers.</p>
<p>Fifth, institutionalize &#x0201C;legitimacy KPIs&#x0201D; for people-managers to ensure that prevention of illegitimate assignments is measured, monitored, and rewarded alongside traditional performance metrics. Because hiding is invisible to standard productivity dashboards, organizations should add &#x0201C;% high-value tasks&#x0201D; and &#x0201C;quarterly illegitimacy slope&#x0201D; to manager scorecards, creating accountability for relational climate at the same level as revenue or deadline targets. Balanced-scorecard field studies show that when relational KPIs are tied to bonuses, supervisors reduce low-utility assignments by 15 % and improve team knowledge-hiding climate by 0.32 SD within 6 months (<xref ref-type="bibr" rid="B4">Colquitt et al., 2013</xref>). Cascading these KPIs from division to individual managers ensures that the within-person illegitimacy&#x02013;hiding spiral we documented is visible and actionable, converting our temporal mediation finding into a concrete management incentive that protects both employee wellbeing and organizational performance.</p>
</sec>
</sec>
<sec id="s6">
<title>Limitations and future directions</title>
<p>We found near-identical effects for unnecessary and unreasonable tasks, contrary to predictions that controllability differences would yield distinct pathways. This suggests that within-person dynamics, the severity of resource threat may override semantic distinctions. Future research should experimentally manipulate task controllability to test whether boundary conditions exist at the event level that are obscured in our quarterly design.</p>
<p>Our use of supervisor-rated knowledge hiding warrants discussion. While self-reports avoid observational bias, they suffer from social desirability. Supervisor ratings, though potentially contaminated by halo effects, align with performance evaluations and capture organizationally visible behaviors. We acknowledge that this approach may reflect <italic>perceived</italic> rather than actual hiding. Future research should triangulate using peer nominations or digital trace data (e.g., reduced contributions to knowledge repositories) to validate our findings.</p>
<p>Our single-context Chinese sample may intensify knowledge hiding effects. High power-distance norms discourage open confrontation with illegitimate assignments, making concealment a low-risk retaliation strategy. While this enhances ecological validity for similar cultures, generalizability to low power-distance contexts (e.g., Nordic countries) requires testing. Multi-country replication is needed to unpack how cultural values moderate the illegitimacy-hiding link.</p>
</sec>
</body>
<back>
<sec sec-type="data-availability" id="s7">
<title>Data availability statement</title>
<p>The raw data supporting the conclusions of this article will be made available by the authors, without undue reservation.</p>
</sec>
<sec sec-type="ethics-statement" id="s8">
<title>Ethics statement</title>
<p>The studies involving humans were approved by Shandong Normal University Business School Ethics Committee. The studies were conducted in accordance with the local legislation and institutional requirements. The participants provided their written informed consent to participate in this study.</p>
</sec>
<sec sec-type="author-contributions" id="s9">
<title>Author contributions</title>
<p>HZ: Data curation, Investigation, Writing &#x02013; review &#x00026; editing. XG: Data curation, Investigation, Writing &#x02013; original draft, Writing &#x02013; review &#x00026; editing. DJ: Conceptualization, Data curation, Methodology, Writing &#x02013; original draft. YL: Data curation, Investigation, Writing &#x02013; review &#x00026; editing.</p>
</sec>
<sec sec-type="COI-statement" id="conf1">
<title>Conflict of interest</title>
<p>The author(s) declared that this work was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.</p>
</sec>
<sec sec-type="ai-statement" id="s11">
<title>Generative AI statement</title>
<p>The author(s) declared that generative AI was not used in the creation of this manuscript.</p>
<p>Any alternative text (alt text) provided alongside figures in this article has been generated by Frontiers with the support of artificial intelligence and reasonable efforts have been made to ensure accuracy, including review by the authors wherever possible. If you identify any issues, please contact us.</p>
</sec>
<sec sec-type="disclaimer" id="s12">
<title>Publisher&#x00027;s note</title>
<p>All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article, or claim that may be made by its manufacturer, is not guaranteed or endorsed by the publisher.</p>
</sec>
<ref-list>
<title>References</title>
<ref id="B1">
<mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Brislin</surname> <given-names>R. W.</given-names></name></person-group> (<year>1980</year>). <article-title>&#x0201C;Translation and content analysis of oral and written materials,&#x0201D;</article-title> in <source>Handbook of Cross-Cultural Psychology: Methodology</source>, eds. H. C. Triandis, and J. W. Berry (Boston, MA: Allyn and Bacon), <fpage>389</fpage>&#x02013;<lpage>444</lpage>.</mixed-citation>
</ref>
<ref id="B2">
<mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Cavanaugh</surname> <given-names>M. A.</given-names></name> <name><surname>Boswell</surname> <given-names>W. R.</given-names></name> <name><surname>Roehling</surname> <given-names>M. V.</given-names></name> <name><surname>Boudreau</surname> <given-names>J. W.</given-names></name></person-group> (<year>2000</year>). <article-title>An empirical examination of self-reported work stress among U.S. managers</article-title>. <source>J. Appl. Psychol.</source> <volume>85</volume>, <fpage>65</fpage>&#x02013;<lpage>74</lpage>. doi: <pub-id pub-id-type="doi">10.1037/0021-9010.85.1.65</pub-id><pub-id pub-id-type="pmid">10740957</pub-id></mixed-citation>
</ref>
<ref id="B3">
<mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Chen</surname> <given-names>F. F.</given-names></name></person-group> (<year>2007</year>). <article-title>Sensitivity of goodness of fit indexes to lack of measurement invariance</article-title>. <source>Struct. Equ. Model.</source> <volume>14</volume>, <fpage>464</fpage>&#x02013;<lpage>504</lpage>. doi: <pub-id pub-id-type="doi">10.1080/10705510701301834</pub-id></mixed-citation>
</ref>
<ref id="B4">
<mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Colquitt</surname> <given-names>J.</given-names></name> <name><surname>Scott</surname> <given-names>B.</given-names></name> <name><surname>Rodell</surname> <given-names>J.</given-names></name> <name><surname>Long</surname> <given-names>D.</given-names></name> <name><surname>Zapata</surname> <given-names>C.</given-names></name> <name><surname>Conlon</surname> <given-names>D.</given-names></name> <etal/></person-group>. (<year>2013</year>). <article-title>Justice at the millennium, a decade later: a meta-analytic test of social exchange and affect-based perspectives</article-title>. <source>J. Appl. Psychol.</source> <volume>98</volume>, <fpage>199</fpage>&#x02013;<lpage>236</lpage>. doi: <pub-id pub-id-type="doi">10.1037/a0031757</pub-id><pub-id pub-id-type="pmid">23458336</pub-id></mixed-citation>
</ref>
<ref id="B5">
<mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Corbo</surname> <given-names>L.</given-names></name> <name><surname>Kraus</surname> <given-names>S.</given-names></name> <name><surname>Vla&#x0010D;i&#x00107;</surname> <given-names>B.</given-names></name> <etal/></person-group>. (<year>2023</year>). <article-title>Coopetition and innovation: a review and research agenda</article-title>. <source>Technovation</source> <volume>122</volume>:<fpage>102624</fpage>. doi: <pub-id pub-id-type="doi">10.1016/j.technovation.2022.102624</pub-id></mixed-citation>
</ref>
<ref id="B6">
<mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Costantini</surname> <given-names>A.</given-names></name> <name><surname>Vignoli</surname> <given-names>M.</given-names></name> <name><surname>Avanzi</surname> <given-names>L.</given-names></name></person-group> (<year>2025</year>). <article-title>Illegitimate tasks and demand crafting: how configurations of illegitimacy shape proactive coping at work</article-title>. <source>J. Bus. Psychol.</source> <volume>29</volume>:<fpage>2025</fpage>. doi: <pub-id pub-id-type="doi">10.1007/s10869-025-10080-1</pub-id></mixed-citation>
</ref>
<ref id="B7">
<mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Cropanzano</surname> <given-names>R.</given-names></name> <name><surname>Anthony</surname> <given-names>E. L.</given-names></name> <name><surname>Daniels</surname> <given-names>S. R.</given-names></name> <name><surname>Hall</surname> <given-names>A. V.</given-names></name></person-group> (<year>2017</year>). <article-title>Social exchange theory: a critical review with theoretical remedies</article-title>. <source>Acad. Manag. Ann.</source> <volume>11</volume>, <fpage>1</fpage>&#x02013;<lpage>38</lpage>. doi: <pub-id pub-id-type="doi">10.5465/annals.2015.0099</pub-id></mixed-citation>
</ref>
<ref id="B8">
<mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Cropanzano</surname> <given-names>R.</given-names></name> <name><surname>Mitchell</surname> <given-names>M.</given-names></name></person-group> (<year>2005</year>). <article-title>Social exchange theory: an interdisciplinary review</article-title>. <source>J. Manage.</source> <volume>31</volume>, <fpage>874</fpage>&#x02013;<lpage>900</lpage>. doi: <pub-id pub-id-type="doi">10.1177/0149206305279602</pub-id></mixed-citation>
</ref>
<ref id="B9">
<mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Ding</surname> <given-names>H.</given-names></name> <name><surname>Kuvaas</surname> <given-names>B.</given-names></name></person-group> (<year>2023</year>). <article-title>Illegitimate tasks: a systematic literature review and agenda for future research</article-title>. <source>Work Stress</source> <volume>37</volume>, <fpage>397</fpage>&#x02013;<lpage>420</lpage>. doi: <pub-id pub-id-type="doi">10.1080/02678373.2022.2148308</pub-id></mixed-citation>
</ref>
<ref id="B10">
<mixed-citation publication-type="book"><person-group person-group-type="author"><name><surname>Durkheim</surname> <given-names>&#x000C9;.</given-names></name> <name><surname>Coser</surname> <given-names>L. A.</given-names></name></person-group> (<year>1998</year>). <source>The Division of Labour in Society</source> (<publisher-loc>trans. WD Halls</publisher-loc>). 8. [print.]. Theoretical traditions in the social sciences. Basingstoke: Macmillan.</mixed-citation>
</ref>
<ref id="B11">
<mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Eatough</surname> <given-names>E.</given-names></name> <name><surname>Meier</surname> <given-names>L.</given-names></name> <name><surname>Igic</surname> <given-names>I.</given-names></name> <etal/></person-group>. (<year>2015</year>). <article-title>You want me to do what? Two daily diary studies of illegitimate tasks and employee wellbeing</article-title>. <source>J. Organ. Behav.</source> <volume>37</volume>:<fpage>2032</fpage>. doi: <pub-id pub-id-type="doi">10.1002/job.2032</pub-id></mixed-citation>
</ref>
<ref id="B12">
<mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Enders</surname> <given-names>C.</given-names></name></person-group> (<year>2010</year>). <source>Applied Missing Data Analysis.</source></mixed-citation>
</ref>
<ref id="B13">
<mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Fait</surname> <given-names>M.</given-names></name> <name><surname>Magni</surname> <given-names>D.</given-names></name> <name><surname>Perano</surname> <given-names>M.</given-names></name> <name><surname>Farina Briamonte</surname> <given-names>M.</given-names></name> <name><surname>Sasso</surname> <given-names>P.</given-names></name></person-group> (<year>2022</year>). <article-title>Grassroot processes of knowledge sharing to build social innovation capabilities</article-title>. <source>J. Knowl. Manag.</source> <volume>27</volume>, <fpage>1390</fpage>&#x02013;<lpage>1408</lpage>. doi: <pub-id pub-id-type="doi">10.1108/JKM-04-2022-0338</pub-id></mixed-citation>
</ref>
<ref id="B14">
<mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>F&#x000E4;lt&#x000E9;n</surname> <given-names>R.</given-names></name> <name><surname>Berntson</surname> <given-names>E.</given-names></name> <name><surname>Bernhard-Oettel</surname> <given-names>C.</given-names></name></person-group> (<year>2025</year>). <article-title>Illegitimate tasks in the public sector&#x02014;associations with work engagement, stress, and turnover intention: the moderating role of leadership</article-title>. <source>Nord Psychol.</source> 372&#x02013;394. doi: <pub-id pub-id-type="doi">10.1080/19012276.2024.2444932</pub-id></mixed-citation>
</ref>
<ref id="B15">
<mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Folger</surname> <given-names>R.</given-names></name></person-group> (<year>1997</year>). <article-title>Retaliation in the workplace: the roles of distributive, procedural, and interactional justice</article-title>. <source>J. Appl. Psychol.</source> <volume>1</volume>:<fpage>1997</fpage>.</mixed-citation>
</ref>
<ref id="B16">
<mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Gabriel</surname> <given-names>A. S.</given-names></name> <name><surname>Diefendorff</surname> <given-names>J. M.</given-names></name> <name><surname>Grandey</surname> <given-names>A. A.</given-names></name></person-group> (<year>2023</year>). <article-title>The acceleration of emotional labor research: navigating the past and steering toward the future</article-title>. <source>Pers. Psychol.</source> <volume>76</volume>, <fpage>511</fpage>&#x02013;<lpage>545</lpage>. doi: <pub-id pub-id-type="doi">10.1111/peps.12576</pub-id></mixed-citation>
</ref>
<ref id="B17">
<mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Grant</surname> <given-names>A. M.</given-names></name> <name><surname>Ashford</surname> <given-names>S. J.</given-names></name></person-group> (<year>2008</year>). <article-title>The dynamics of proactivity at work</article-title>. <source>Res. Organ. Behav.</source> <volume>28</volume>, <fpage>3</fpage>&#x02013;<lpage>34</lpage>. doi: <pub-id pub-id-type="doi">10.1016/j.riob.2008.04.002</pub-id></mixed-citation>
</ref>
<ref id="B18">
<mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Gro&#x00161;elj</surname> <given-names>M.</given-names></name> <name><surname>&#x0010C;erne</surname> <given-names>M.</given-names></name> <name><surname>Penger</surname> <given-names>S.</given-names></name> <name><surname>Grah</surname> <given-names>B.</given-names></name></person-group> (<year>2020</year>). <article-title>Authentic and transformational leadership and innovative work behaviour: the moderating role of psychological empowerment</article-title>. <source><italic>Eur. J. Innov. Manag</italic>.</source> <volume>24</volume>, <fpage>677</fpage>&#x02013;<lpage>706</lpage>. doi: <pub-id pub-id-type="doi">10.1108/ejim-10-2019-0294</pub-id></mixed-citation>
</ref>
<ref id="B19">
<mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Hamaker</surname> <given-names>E.</given-names></name> <name><surname>Kuiper</surname> <given-names>R.</given-names></name> <name><surname>Grasman</surname> <given-names>R.</given-names></name></person-group> (<year>2015</year>). <article-title>A critique of the cross-lagged panel model</article-title>. <source>Psychol. Methods</source> <volume>20</volume>, <fpage>102</fpage>&#x02013;<lpage>116</lpage>. doi: <pub-id pub-id-type="doi">10.1037/a0038889</pub-id><pub-id pub-id-type="pmid">25822208</pub-id></mixed-citation>
</ref>
<ref id="B20">
<mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Hameed</surname> <given-names>I.</given-names></name> <name><surname>Arain G</surname> <given-names>A.</given-names></name> <name><surname>Nicolau J</surname> <given-names>L.</given-names></name></person-group> (<year>2023</year>). <article-title>Leader knowledge hiding and employee change-oriented voice: a dual mediation process</article-title>. <source>Tour. Manag.</source> <volume>98</volume>:<fpage>104781</fpage>. doi: <pub-id pub-id-type="doi">10.1016/j.tourman.2023.104781</pub-id></mixed-citation>
</ref>
<ref id="B21">
<mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Hobfoll</surname> <given-names>S. E.</given-names></name></person-group> (<year>1989</year>). <article-title>Conservation of resources: a new attempt at conceptualizing stress</article-title>. <source>Am. Psychol.</source><volume>44</volume>, <fpage>513</fpage>&#x02013;<lpage>524</lpage>. doi: <pub-id pub-id-type="doi">10.1037/0003-066X.44.3.513</pub-id><pub-id pub-id-type="pmid">2648906</pub-id></mixed-citation>
</ref>
<ref id="B22">
<mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Humphrey</surname> <given-names>S. E.</given-names></name> <name><surname>Nahrgang</surname> <given-names>J. D.</given-names></name> <name><surname>Morgeson</surname> <given-names>F. P.</given-names></name></person-group> (<year>2007</year>). <article-title>Integrating motivational, social, and contextual work design features: a meta-analytic summary and theoretical extension of the work design literature</article-title>. <source>J. Appl. Psychol.</source> <volume>92</volume>, <fpage>1332</fpage>&#x02013;<lpage>1356</lpage>. doi: <pub-id pub-id-type="doi">10.1037/0021-9010.92.5.1332</pub-id><pub-id pub-id-type="pmid">17845089</pub-id></mixed-citation>
</ref>
<ref id="B23">
<mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Jiang</surname> <given-names>F.</given-names></name> <name><surname>Lu</surname> <given-names>S.</given-names></name> <name><surname>Ji</surname> <given-names>L.-J.</given-names></name> <name><surname>Wang</surname> <given-names>H.-J.</given-names></name></person-group> (<year>2023</year>). <article-title>Culture and the way of granting job autonomy: goal or execution?</article-title> <source>J. <italic>Occup. Organ. Psychol</italic>.</source> <volume>96</volume>, <fpage>624</fpage>&#x02013;<lpage>645</lpage>. doi: <pub-id pub-id-type="doi">10.1111/joop.12438</pub-id></mixed-citation>
</ref>
<ref id="B24">
<mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Katz</surname> <given-names>I. M.</given-names></name> <name><surname>Rudolph</surname> <given-names>C. W.</given-names></name> <name><surname>Kuehner</surname> <given-names>C.</given-names></name> <name><surname>Zacher</surname> <given-names>H.</given-names></name></person-group> (<year>2023</year>). <article-title>Job characteristics and employee green behavior</article-title>. <source>J. Environ. Psychol.</source> <volume>92</volume>:<fpage>102159</fpage>. doi: <pub-id pub-id-type="doi">10.1016/j.jenvp.2023.102159</pub-id></mixed-citation>
</ref>
<ref id="B25">
<mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Koopman</surname> <given-names>J.</given-names></name> <name><surname>Lanaj</surname> <given-names>K.</given-names></name> <name><surname>Scott B</surname> <given-names>A.</given-names></name></person-group> (<year>2016</year>). <article-title>Integrating the bright and dark sides of OCB: a daily investigation of the benefits and costs of helping others</article-title>. <source>Acad. Manag. J.</source> <volume>59</volume>, <fpage>414</fpage>&#x02013;<lpage>435</lpage>. doi: <pub-id pub-id-type="doi">10.5465/amj.2014.0262</pub-id></mixed-citation>
</ref>
<ref id="B26">
<mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Kostovicova</surname> <given-names>D.</given-names></name> <name><surname>Vico</surname> <given-names>S.</given-names></name></person-group> (<year>2024</year>). <article-title>Interactions for Justice: an introduction</article-title>. <source>J. Interv. Statebuild</source> <volume>18</volume>, <fpage>493</fpage>&#x02013;<lpage>511</lpage>. doi: <pub-id pub-id-type="doi">10.1080/17502977.2024.2437589</pub-id></mixed-citation>
</ref>
<ref id="B27">
<mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Kottwitz</surname> <given-names>M. U.</given-names></name> <name><surname>K&#x000E4;lin</surname> <given-names>W.</given-names></name> <name><surname>Otto</surname> <given-names>K.</given-names></name></person-group> (<year>2025</year>). <article-title>Illegitimate tasks predict sleep disturbances and musculoskeletal pain: single and serial indirect effects of qualitative job insecurity and emotional exhaustion</article-title>. <source>Occup. Health Sci.</source> <volume>9</volume>, <fpage>711</fpage>&#x02013;<lpage>742</lpage>. doi: <pub-id pub-id-type="doi">10.1007/s41542-025-00227-0</pub-id></mixed-citation>
</ref>
<ref id="B28">
<mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Kruk</surname> <given-names>M.</given-names></name> <name><surname>Pawlak</surname> <given-names>M.</given-names></name> <name><surname>Taherian</surname> <given-names>T.</given-names></name> <name><surname>Y&#x000FC;ce</surname> <given-names>E.</given-names></name></person-group> (<year>2023</year>). <article-title>When time matters: mechanisms of change in a mediational model of foreign language playfulness and L2 learners&#x00027; emotions using latent change score mediation model</article-title>. <source>Stud. Second Lang. Learn. Teach.</source><volume>13</volume>, <fpage>39</fpage>&#x02013;<lpage>69</lpage>. doi: <pub-id pub-id-type="doi">10.14746/ssllt.37174</pub-id></mixed-citation>
</ref>
<ref id="B29">
<mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Kunzelmann</surname> <given-names>A.</given-names></name> <name><surname>Rigotti</surname> <given-names>T.</given-names></name> <name><surname>Crane M</surname> <given-names>F.</given-names></name></person-group> (<year>2025</year>). <article-title>Latent profiles of challenge, hindrance, and threat appraisals on time pressure and job complexity: antecedents and outcomes</article-title>. <source>Aus. J. Manag.</source> <volume>50</volume>, <fpage>431</fpage>&#x02013;<lpage>458</lpage>. doi: <pub-id pub-id-type="doi">10.1177/03128962231222825</pub-id></mixed-citation>
</ref>
<ref id="B30">
<mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>L&#x000E5;stad</surname> <given-names>L.</given-names></name> <name><surname>Pienaar</surname> <given-names>J.</given-names></name> <name><surname>N&#x000E4;swall</surname> <given-names>K.</given-names></name> <name><surname>Richter</surname> <given-names>A.</given-names></name> <name><surname>Hellgren</surname> <given-names>J.</given-names></name> <name><surname>Sverke</surname> <given-names>M.</given-names></name></person-group> (<year>2025</year>). <article-title>Moving on up now? <italic>A</italic> meta-analysis of the associations between job insecurity and career-related outcomes</article-title>. <source>Scand. J. Work Organ. Psychol.</source> <volume>10</volume>:<fpage>2</fpage>. doi: <pub-id pub-id-type="doi">10.16993/sjwop.275</pub-id></mixed-citation>
</ref>
<ref id="B31">
<mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Lazarus</surname> <given-names>R.</given-names></name> <name><surname>Folkman</surname> <given-names>S.</given-names></name></person-group> (<year>1984</year>). <source>Stress, Appraisal and Coping.</source></mixed-citation>
</ref>
<ref id="B32">
<mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Liu</surname> <given-names>J.</given-names></name> <name><surname>Perera</surname> <given-names>R. A.</given-names></name></person-group> (<year>2023</year>). <article-title>Assessing mediational processes using piecewise linear growth curve models with individual measurement occasions</article-title>. <source>Behav. Res. Methods</source> <volume>55</volume>, <fpage>3218</fpage>&#x02013;<lpage>3240</lpage>. doi: <pub-id pub-id-type="doi">10.3758/s13428-022-01940-2</pub-id><pub-id pub-id-type="pmid">36085545</pub-id></mixed-citation>
</ref>
<ref id="B33">
<mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>McArdle</surname> <given-names>J. J.</given-names></name></person-group> (<year>2009</year>). <article-title>Latent variable modeling of differences and changes with longitudinal data</article-title>. <source>Annual Rev. Psychol.</source> <volume>60</volume>, <fpage>577</fpage>&#x02013;<lpage>605</lpage>. doi: <pub-id pub-id-type="doi">10.1146/annurev.psych.60.110707.163612</pub-id><pub-id pub-id-type="pmid">18817479</pub-id></mixed-citation>
</ref>
<ref id="B34">
<mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Miheli&#x0010D;</surname> <given-names>K. K.</given-names></name> <name><surname>Zupan</surname> <given-names>N.</given-names></name> <name><surname>Merku</surname> <given-names>&#x0017D; A.</given-names></name></person-group> (<year>2024</year>). <article-title>I feel the need &#x02013; the need for speed! Unreasonable tasks, work pace, psychological detachment and emotional exhaustion</article-title>. <source>J. Organ. Effect. People Perform.</source> <volume>11</volume>, <fpage>162</fpage>&#x02013;<lpage>177</lpage>. doi: <pub-id pub-id-type="doi">10.1108/JOEPP-07-2021-0185</pub-id></mixed-citation>
</ref>
<ref id="B35">
<mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Muntz</surname> <given-names>J.</given-names></name> <name><surname>Dormann</surname> <given-names>C.</given-names></name> <name><surname>Kronenwett</surname> <given-names>M.</given-names></name></person-group> (<year>2019</year>). <article-title>Supervisors&#x00027; relational transparency moderates effects among employees&#x00027; illegitimate tasks and job dissatisfaction: a four-wave panel study</article-title>. <source>Eur. J. Work Organ. Psychol.</source> <volume>58</volume>, <fpage>1</fpage>&#x02013;<lpage>13</lpage>. doi: <pub-id pub-id-type="doi">10.1080/1359432X.2019.1625888</pub-id></mixed-citation>
</ref>
<ref id="B36">
<mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Oldham</surname> <given-names>G. R.</given-names></name> <name><surname>Hackman</surname> <given-names>J. R.</given-names></name></person-group> (<year>2010</year>). <article-title>Not what it was and not what it will be: the future of job design research</article-title>. <source>J. Organ. Behav.</source> <volume>31</volume>, <fpage>463</fpage>&#x02013;<lpage>479</lpage>. doi: <pub-id pub-id-type="doi">10.1002/job.678</pub-id></mixed-citation>
</ref>
<ref id="B37">
<mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Parker</surname> <given-names>S.</given-names></name> <name><surname>Morgeson</surname> <given-names>F.</given-names></name> <name><surname>Johns</surname> <given-names>G.</given-names></name></person-group> (<year>2017</year>). <article-title>One hundred years of work design research: looking back and looking forward</article-title>. <source>J. Appl. Psychol.</source> <volume>102</volume>, <fpage>403</fpage>&#x02013;<lpage>420</lpage>. doi: <pub-id pub-id-type="doi">10.1037/apl0000106</pub-id><pub-id pub-id-type="pmid">28182465</pub-id></mixed-citation>
</ref>
<ref id="B38">
<mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Pham Thi</surname> <given-names>T. D.</given-names></name> <name><surname>Duong</surname> <given-names>N. T.</given-names></name></person-group> (<year>2024</year>). <article-title>Investigating learning burnout and academic performance among management students: a longitudinal study in English courses</article-title>. <source>BMC Psychol.</source> <volume>12</volume>:<fpage>219</fpage>. doi: <pub-id pub-id-type="doi">10.1186/s40359-024-01725-6</pub-id><pub-id pub-id-type="pmid">38650026</pub-id></mixed-citation>
</ref>
<ref id="B39">
<mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Pindek</surname> <given-names>S.</given-names></name> <name><surname>Demircioglu Nayir</surname> <given-names>E.</given-names></name> <name><surname>Howard</surname> <given-names>D.</given-names></name> <name><surname>Eatough</surname> <given-names>E. M.</given-names></name></person-group> (<year>2018</year>). <article-title>Illegitimate tasks are not created equal: examining the effects of attributions on unreasonable and unnecessary tasks</article-title>. <source>Work Stress</source> <volume>33</volume>, <fpage>1</fpage>&#x02013;<lpage>16</lpage>. doi: <pub-id pub-id-type="doi">10.1080/02678373.2018.1445672</pub-id></mixed-citation>
</ref>
<ref id="B40">
<mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Pindek</surname> <given-names>S.</given-names></name> <name><surname>Meyer</surname> <given-names>K.</given-names></name> <name><surname>Valvo</surname> <given-names>A.</given-names></name> <name><surname>Arvan</surname> <given-names>M.</given-names></name></person-group> (<year>2024</year>). <article-title>A dynamic view of the challenge-hindrance stressor framework: a meta-analysis of daily diary studies</article-title>. <source>J. Bus. Psychol.</source> <volume>39</volume>, <fpage>1107</fpage>&#x02013;<lpage>1125</lpage>. doi: <pub-id pub-id-type="doi">10.1007/s10869-024-09933-y</pub-id></mixed-citation>
</ref>
<ref id="B41">
<mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Pindek</surname> <given-names>S.</given-names></name> <name><surname>Zhou</surname> <given-names>Z. E.</given-names></name> <name><surname>Kessler</surname> <given-names>S. R.</given-names></name> <name><surname>Krajcevska</surname> <given-names>A.</given-names></name> <name><surname>Spector</surname> <given-names>P. E.</given-names></name></person-group> (<year>2021</year>). <article-title>Workdays are not created equal: job satisfaction and job stressors across the workweek</article-title>. <source><italic>Hum. Relat</italic>.</source> <volume>74</volume>, <fpage>1447</fpage>&#x02013;<lpage>1472</lpage>. doi: <pub-id pub-id-type="doi">10.1177/0018726720924444</pub-id></mixed-citation>
</ref>
<ref id="B42">
<mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Podsakoff</surname> <given-names>N. P.</given-names></name> <name><surname>LePine</surname> <given-names>J. A.</given-names></name> <name><surname>LePine</surname> <given-names>M. A.</given-names></name></person-group> (<year>2007</year>). <article-title>Differential challenge stressor-hindrance stressor relationships with job attitudes, turnover intentions, turnover, and withdrawal behavior: a meta-analysis</article-title>. <source>J. Appl. Psychol.</source> <volume>92</volume>:<fpage>438</fpage>. doi: <pub-id pub-id-type="doi">10.1037/0021-9010.92.2.438</pub-id><pub-id pub-id-type="pmid">17371090</pub-id></mixed-citation>
</ref>
<ref id="B43">
<mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Preacher</surname> <given-names>K. J.</given-names></name> <name><surname>Selig</surname> <given-names>J. P.</given-names></name></person-group> (<year>2012</year>). <article-title>Advantages of monte carlo confidence intervals for indirect effects</article-title>. <source>Commun. Methods Meas.</source> <volume>6</volume>, <fpage>77</fpage>&#x02013;<lpage>98</lpage>. doi: <pub-id pub-id-type="doi">10.1080/19312458.2012.679848</pub-id></mixed-citation>
</ref>
<ref id="B44">
<mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Rhee</surname> <given-names>Y.</given-names></name> <name><surname>Choi</surname> <given-names>J.</given-names></name></person-group> (<year>2016</year>). <article-title>Knowledge management behavior and individual creativity: goal orientations as antecedents and in-group social status as moderating contingency: knowledge management behavior</article-title>. <source>J. Organ. Behav.</source> <volume>38</volume>:<fpage>job2168</fpage>. doi: <pub-id pub-id-type="doi">10.1002/job.2168</pub-id></mixed-citation>
</ref>
<ref id="B45">
<mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Rodell</surname> <given-names>J. B.</given-names></name> <name><surname>Judge</surname> <given-names>T. A.</given-names></name></person-group> (<year>2009</year>). <article-title>Can &#x0201C;good&#x0201D; stressors spark &#x0201C;bad&#x0201D; behaviors? The mediating role of emotions in links of challenge and hindrance stressors with citizenship and counterproductive behaviors</article-title>. <source>J. Appl. Psychol.</source> <volume>94</volume>, <fpage>1438</fpage>&#x02013;<lpage>1451</lpage>. doi: <pub-id pub-id-type="doi">10.1037/a0016752</pub-id><pub-id pub-id-type="pmid">19916654</pub-id></mixed-citation>
</ref>
<ref id="B46">
<mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Schilbach</surname> <given-names>M.</given-names></name> <name><surname>Arnold</surname> <given-names>M.</given-names></name> <name><surname>Baethge</surname> <given-names>A.</given-names></name> <name><surname>Rigotti</surname> <given-names>T.</given-names></name></person-group> (<year>2023</year>). <article-title>Hindrance demands as a boundary condition to the appraisal of challenge demands</article-title>. <source>Anxiety Stress Coping</source> <volume>36</volume>, <fpage>434</fpage>&#x02013;<lpage>443</lpage>. doi: <pub-id pub-id-type="doi">10.1080/10615806.2022.2108019</pub-id><pub-id pub-id-type="pmid">35938551</pub-id></mixed-citation>
</ref>
<ref id="B47">
<mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Semmer</surname> <given-names>N.</given-names></name> <name><surname>Jacobshagen</surname> <given-names>N.</given-names></name> <name><surname>Meier</surname> <given-names>L. M.</given-names></name> <name><surname>Elfering</surname> <given-names>A.</given-names></name> <name><surname>Beehr</surname> <given-names>T. A.</given-names></name> <name><surname>K&#x000E4;lin</surname> <given-names>W.</given-names></name> <etal/></person-group>. (<year>2015</year>). <article-title>Illegitimate tasks as a source of work stress</article-title>. <source>Work Stress</source> <volume>1</volume>, <fpage>32</fpage>&#x02013;<lpage>56</lpage>. doi: <pub-id pub-id-type="doi">10.1080/02678373.2014.1003996</pub-id><pub-id pub-id-type="pmid">25892839</pub-id></mixed-citation>
</ref>
<ref id="B48">
<mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Semmer</surname> <given-names>N. K.</given-names></name> <name><surname>Tschan</surname> <given-names>F.</given-names></name> <name><surname>Meier L</surname> <given-names>L.</given-names></name> <name><surname>Facchin</surname> <given-names>S.</given-names></name> <name><surname>Jacobshagen</surname> <given-names>N.</given-names></name></person-group> (<year>2010</year>). <article-title>Illegitimate tasks and counterproductive work behavior</article-title>. <source>Appl. Psychol.</source> <volume>59</volume>, <fpage>70</fpage>&#x02013;<lpage>96</lpage>. doi: <pub-id pub-id-type="doi">10.1111/j.1464-0597.2009.00416.x</pub-id></mixed-citation>
</ref>
<ref id="B49">
<mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Tan</surname> <given-names>Z.</given-names></name> <name><surname>Yuan</surname> <given-names>L.</given-names></name> <name><surname>Wang</surname> <given-names>J.</given-names></name> <name><surname>Wan</surname> <given-names>Q.</given-names></name></person-group> (<year>2024</year>). <article-title>When the victims fight back: the influence of workplace ostracism on employee knowledge sabotage behavior</article-title>. <source>J. Knowl. Manag.</source> <volume>28</volume>, <fpage>1249</fpage>&#x02013;<lpage>1277</lpage>. doi: <pub-id pub-id-type="doi">10.1108/JKM-04-2023-0303</pub-id></mixed-citation>
</ref>
<ref id="B50">
<mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Tims</surname> <given-names>M.</given-names></name> <name><surname>Bakker A</surname> <given-names>B.</given-names></name> <name><surname>Derks</surname> <given-names>D.</given-names></name></person-group> (<year>2015</year>). <article-title>Job crafting and job performance: a longitudinal study</article-title>. <source>Eur. J. Work Organ. Psychol.</source> <volume>24</volume>, <fpage>914</fpage>&#x02013;<lpage>928</lpage>. doi: <pub-id pub-id-type="doi">10.1080/1359432X.2014.969245</pub-id></mixed-citation>
</ref>
<ref id="B51">
<mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Van Dyne</surname> <given-names>L.</given-names></name> <name><surname>LePine</surname> <given-names>J. A.</given-names></name></person-group> (<year>1998</year>). <article-title>Helping and voice extra-role behaviors: evidence of construct and predictive validity</article-title>. <source>Acad. Manag. J.</source> <volume>41</volume>, <fpage>108</fpage>&#x02013;<lpage>119</lpage>. doi: <pub-id pub-id-type="doi">10.2307/256902</pub-id></mixed-citation>
</ref>
<ref id="B52">
<mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Wang</surname> <given-names>S.</given-names></name> <name><surname>Noe</surname> <given-names>R.</given-names></name></person-group> (<year>2010</year>). <article-title>Knowledge sharing: a review and directions for future research</article-title>. <source>Hum. Res. Manag. Rev</source>. <volume>20</volume>, <fpage>115</fpage>&#x02013;<lpage>131</lpage>. doi: <pub-id pub-id-type="doi">10.1016/j.hrmr.2009.10.001</pub-id></mixed-citation>
</ref>
<ref id="B53">
<mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Webster</surname> <given-names>J.</given-names></name> <name><surname>Beehr</surname> <given-names>T.</given-names></name> <name><surname>Christiansen</surname> <given-names>N.</given-names></name></person-group> (<year>2010</year>). <article-title>Toward a better understanding of the effects of hindrance and challenge stressors on work behavior</article-title>. <source>J. Vocat. Behav.</source> <volume>76</volume>, <fpage>68</fpage>&#x02013;<lpage>77</lpage>. doi: <pub-id pub-id-type="doi">10.1016/j.jvb.2009.06.012</pub-id></mixed-citation>
</ref>
<ref id="B54">
<mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Yuan</surname> <given-names>S.</given-names></name> <name><surname>Yan</surname> <given-names>Y.</given-names></name></person-group> (<year>2024</year>). <article-title>Illegitimate tasks and knowledge hiding: the mediating role of psychological contract violation and moderating role of optimism</article-title>. <source>J. Manag. Psychol.</source> <volume>40</volume>, <fpage>37</fpage>&#x02013;<lpage>51</lpage>. doi: <pub-id pub-id-type="doi">10.1108/JMP-03-2023-0154</pub-id></mixed-citation>
</ref>
<ref id="B55">
<mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Zweig</surname> <given-names>D.</given-names></name></person-group> (<year>2012</year>). <article-title>Knowledge hiding in organizations</article-title>. <source>J. Organ. Behav.</source> <volume>1</volume>, <fpage>2012</fpage>. doi: <pub-id pub-id-type="doi">10.1002/job.737</pub-id></mixed-citation>
</ref>
</ref-list>
<fn-group>
<fn fn-type="custom" custom-type="edited-by" id="fn0001">
<p>Edited by: <ext-link ext-link-type="uri" xlink:href="https://loop.frontiersin.org/people/1705707/overview">Jesus Juyumaya</ext-link>, Santo Tom&#x000E1;s University, Chile</p>
</fn>
<fn fn-type="custom" custom-type="reviewed-by" id="fn0002">
<p>Reviewed by: <ext-link ext-link-type="uri" xlink:href="https://loop.frontiersin.org/people/3269973/overview">Vera Voitova</ext-link>, Santo Tom&#x000E1;s University, Chile</p>
<p><ext-link ext-link-type="uri" xlink:href="https://loop.frontiersin.org/people/3301232/overview">Juan Carlos Armijos</ext-link>, Santo Tom&#x000E1;s University, Chile</p>
</fn>
</fn-group>
</back>
</article>