google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=&cad=rja&uact=8&ved=2ahUKEwjD4tW32v_xAhUhFFkFHQDkB0oQFjAwegQIVRAD&url=https%3A%2F%2Fjournals.aom.org%2Fdoi%2Fpdf%2F10.5465%2Fapbpp.2001.6133670&usg=AOvVaw2VGN-fONlquodObZ_L7EzM
Transactive memory system development in virtual teams | Proceedings of the 2007 ACM SIGMIS CPR conference on Computer personnel research: The global information technology workforce
google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=&cad=rja&uact=8&ved=2ahUKEwjD4tW32v_xAhUhFFkFHQDkB0oQFjA0egQIcBAD&url=https%3A%2F%2Fwww.berghahnbooks.com%2Fdownloads%2FOpenAccess%2FMitchellGirlhood%2FMitchellGirlhood_14.pdf&usg=AOvVaw3s89LYigIiwdHTnu2i5TYp
When cooperatives act on their shared identity, good policy follows - NCBA CLUSA
Understanding our co-op identity is more than an academic exercise; it builds our reputation and can shape policy.
google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=&cad=rja&uact=8&ved=2ahUKEwjD4tW32v_xAhUhFFkFHQDkB0oQFjA3egUIhwEQAw&url=https%3A%2F%2Fstatic1.squarespace.com%2Fstatic%2F559921a3e4b02c1d7480f8f4%2Ft%2F585c6c16cd0f680511133aa2%2F1482451996164%2FEichinger.pdf&usg=AOvVaw3XnvP5g7BzdL0vAAd9xVrF
Proteus vs. Social identity effects on virtual brainstorming. - PsycNET
shared identity Archives | Institute for Public Relations
Virtual Customers behind Avatars: The Relationship between Virtual Identity and Virtual Consumption in Second Life
Bridged Forces Connect Virtual Hangout — theCDEI @ Berklee
Bridged Forces Connect is a hangout space for military connected students and their families. Open to Students.
Struggling with a shared identity in a global HR team under a constant change — Aalto University's research portal
Virtual Identity Server - LDAP Virtual Directory
The Optimal IdM Virtual Identity Server offers a single, joined view of identity data from any data store including other LDAP virtual directories.
The Value of Intentional Cross-Identity Mentorship: Examining the Benefits of Shared and Differing-Identity Mentors
There are benefits to engaging with a mentor with whom you do not share an identity.
Identity, Advertising and the Future of Journalism: A Virtual Forum (Part Two of Three) – COLab
From Privacy Beat: “What would be possible — for advertising, for privacy and for journalism — if the Internet had a way to govern, in the public interest, how identity data are shared and used?” You’re invited to look in on a part two of a free, public, provocative, three-part discussion on Thur
google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=&cad=rja&uact=8&ved=2ahUKEwjD4tW32v_xAhUhFFkFHQDkB0oQFjBMegQILhAD&url=http%3A%2F%2Fqiaosiwang.me%2FPublications%2Fjwsa-chilbw2020.pdf&usg=AOvVaw1nHYlPLgISg1RPRwlO-oLz
Page not found (404) : University of Sussex
A case study investigation of the shared identity of the Papua New Guineans Against Domestic Violence Facebook Group
google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=&cad=rja&uact=8&ved=2ahUKEwjD4tW32v_xAhUhFFkFHQDkB0oQFjBRegQIRRAD&url=https%3A%2F%2Fs3-eu-west-1.amazonaws.com%2Fpstorage-loughborough-53465%2F17097983%2FFinalcultureboundaryandidentity16_5_16.pdf&usg=AOvVaw07YDLIl0iP8vJtYNqXNkfL
Identity and Deception in the Virtual Community
ForgeRock Identity Management 7 > Object Modeling Guide > Virtual Properties
Properties can be derived from other properties within an object. This lets computed
and composite values be created in the object. Such derived properties are named
virtual properties. The value of a virtual property can be
calculated in two ways:
Cisco Identity Services Engine Installation Guide, Release 2.4 - SNS 3500/3600 Series Appliances and Virtual Machine Requirements [Cisco Identity Services Engine] - Cisco
SNS 3500/3600 Series Appliances and Virtual Machine Requirements
Virtual communities: Interaction, identity and authority in digital communication
This paper analyzes two settings of digital communication in which social actors participate, interact and engage differently within virtual communities. Online identities are interactionally and discursively constructed and this process defines differences in groupness, illustrating the nature of those online spaces. This study builds on the notion of Citizen Sociolinguistics, that is, ordinary people producing metacommentaries on language uses, to examine the data in different digital communication settings. This work analyzes 500 comments posted by readers on the site of the newspaper El País , in response to an article announcing the new Spanish orthographic reforms. Additionally, it analyzes 200 threads of the “ Sólo español ” (“Spanish only”) sub-forum within WordReference.com. The analysis investigates identity and hierarchy in digital communication as socio-cultural results of linguistic interaction. By analyzing interaction and identity in online spaces, this paper proposes empirical ways to account for differences in virtual communities, reconsiders established criteria such as time and regularity in interaction, and proposes new criteria (hierarchy and authority) to accentuate the distinctions regarding virtual communities.
google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=&cad=rja&uact=8&ved=2ahUKEwjD4tW32v_xAhUhFFkFHQDkB0oQFjBYegQIXhAD&url=https%3A%2F%2Ffiles.eric.ed.gov%2Ffulltext%2FED585082.pdf&usg=AOvVaw1r7Ft4SmqN-sgZ1GJv7xw9
Talent Management in the Hybrid Virtual Work Environment
As the pandemic eases up and more businesses are allowed to re-open, companies are offering a combination of remote and on-site working. Known as a hybrid
Positive Relationship Between Individuality and Social Identity in Virtual Communities: Self-Categorization and Social Identification as Distinct Forms of Social Identity | Cyberpsychology, Behavior, and Social Networking
Cyberpsychology, Behavior, and Social Networking
Case Study Gravitational Wave Research Boosted by Seamless Virtual Identity - Internet2
The international scale involved in gravitational-wave astrophysics research generates a major challenge in managing credentials, access to shared data, resources, and scientific support services.
google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=&cad=rja&uact=8&ved=2ahUKEwjD4tW32v_xAhUhFFkFHQDkB0oQFjBhegQIeRAD&url=https%3A%2F%2Fwww.dhi.ac.uk%2Fsan%2Fwaysofbeing%2Fdata%2Fcommunities-murphy-tanis-2008.pdf&usg=AOvVaw0bSuIMYxwJKSHz5hZeTRRo
google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=&cad=rja&uact=8&ved=2ahUKEwjD4tW32v_xAhUhFFkFHQDkB0oQFjBiegUIhgEQAw&url=http%3A%2F%2Fisiarticles.com%2Fbundles%2FArticle%2Fpre%2Fpdf%2F87504.pdf&usg=AOvVaw2JHQA7juK76ufU28JcMVox
Online Persona - Social Media - Research Guides at Dickinson College
How to Protect Yourself from Identity Theft Online | Webroot
Identity theft is any kind of deception, scam, or crime that results in the loss of personal data which is
Shared Identity Is Key to Effective Communication - Katharine H. Greenaway, Ruth G. Wright, Joanne Willingham, Katherine J. Reynolds, S. Alexander Haslam, 2015
The ability to communicate with others is one of the most important human social functions, yet communication is not always investigated from a social perspecti...