{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T12:14:18Z","timestamp":1725538458663},"publisher-location":"Berlin, Heidelberg","reference-count":84,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540884804"},{"type":"electronic","value":"9783642018206"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-01820-6_2","type":"book-chapter","created":{"date-parts":[[2009,9,18]],"date-time":"2009-09-18T12:02:59Z","timestamp":1253275379000},"page":"19-69","source":"Crossref","is-referenced-by-count":12,"title":["Identity of Identity"],"prefix":"10.1007","author":[{"given":"Thierry","family":"Nabeth","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"2_CR1_2","unstructured":"AAAI (2004), \u2018Brief History of Artificial Intelligence\u2019, AAAI AI Topics dynamic library of introductory information about Artificial Intelligence, url: http:\/\/www.aaai.org\/AITopics\/ bbhist.html"},{"volume-title":"Technology and Privacy: The New Landscape","year":"1998","key":"2_CR2_2","unstructured":"Agre, P. E. and Rotenberg, M. (ed.) (1998), Technology and Privacy: The New Landscape. Cambridge Massachussets: MIT Press."},{"key":"2_CR3_2","unstructured":"ALRC (2008), For Your Information: Australian Privacy Law and Practice. ALRC (Australian Law Reform Commission) report 108, Canberra : Law Reform Commission."},{"issue":"1","key":"2_CR4_2","doi-asserted-by":"publisher","first-page":"164","DOI":"10.1016\/j.dss.2007.12.015","volume":"45","author":"J. Andrade","year":"2008","unstructured":"Andrade, J., Ares, J., Garc\u00eda, R., Pazos, J., Rodr\u00edguez, S., Silva, A. (2008), \u2018Formal conceptualisation as a basis for a more procedural knowledge management\u2019, Decision. Support System. 45 (1), pp. 164\u2013179.","journal-title":"Support System"},{"key":"2_CR5_2","unstructured":"Ariely, D. (2008), Predictably Irrational: The Hidden Forces That Shape Our Decisions. HarperCollins."},{"issue":"5","key":"2_CR6_2","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1038\/scientificamerican0501-34","volume":"284","author":"T. Berners-Lee","year":"2001","unstructured":"Berners-Lee, T., Hendler, J., Lassila, O. (2001), \u2018The Semantic Web\u2019, Scientific American 284 (5), pp. 34\u201343.","journal-title":"Scientific American"},{"key":"2_CR7_2","unstructured":"Bjelland, T. K, (2004), \u2018Classification: assumptions and implications for conceptual modeling\u2019, doctoral dissertation, Department of Information Science and Media Studies, Faculty of Social Science, University of Bergen."},{"issue":"1","key":"2_CR8_2","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1111\/j.1083-6101.2007.00393.x","volume":"13","author":"D. Boyd","year":"2007","unstructured":"Boyd, D. and Ellison, N. (2007), \u2018Social Network Sites: Definition, History, and Scholarship\u2019, Journal of Computer-Mediated Communication 13 (1), article 11.","journal-title":"Journal of Computer-Mediated Communication"},{"issue":"1\u20132","key":"2_CR9_2","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1023\/A:1011143116306","volume":"11","author":"P. Brusilovsky","year":"2001","unstructured":"Brusilovsky, P. (2001), \u2018Adaptive Hypermedia\u2019, User Modeling and User-Adapted Interaction 11 (1\u20132), pp. 87\u2013110.","journal-title":"User Modeling and User-Adapted Interaction"},{"key":"2_CR10_2","doi-asserted-by":"crossref","unstructured":"Brzozowski, M., Hogg, T., Szabo, G. (2008), \u2018Friends and foes: Ideological social networking\u2019, Proceedings of the 26th annual SIGCHI Conference on Human Factors in Computing, ACM Press, pp. 817\u2013820.","DOI":"10.1145\/1357054.1357183"},{"key":"2_CR11_2","doi-asserted-by":"crossref","unstructured":"Chesney, T. (2006), \u2018An empirical examination of Wikipedia's credibility\u2019, First Monday 11 (11), url: http:\/\/firstmonday.org\/issues\/issue11_11\/chesney\/index.html .","DOI":"10.5210\/fm.v11i11.1413"},{"key":"2_CR12_2","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1145\/1379092.1379110","volume-title":"Proceedings of the 19th ACM Conference on Hypertext and Hypermedia","author":"E. H. Chi","year":"2008","unstructured":"Chi, E. H. and Mytkowicz, T. (2008), \u2018Understanding the efficiency of social tagging systems using information theory\u2019, Proceedings of the 19th ACM Conference on Hypertext and Hypermedia; NY: ACM, pp. 81\u201388, url: http:\/\/www.parc.com\/research\/publications\/details.php?id=6294"},{"key":"2_CR13_2","volume-title":"Influence: Science and practice","author":"R. B. Cialdini","year":"2001","unstructured":"Cialdini, R. B. (2001), Influence: Science and practice (4th ed.). Boston: Allyn & Bacon.","edition":"4"},{"key":"2_CR14_2","unstructured":"Claessens, J., D\u00edaz, C., Nikova, S., De Win, B., Goemans, C., Loncke, M., Naessens, V., Seys, S., De Decker, B., Dumortier, J., Preneel, B. (2003), \u2018Applications Requirements for Controlled Anonymity\u2019, APES Deliverable D7."},{"key":"2_CR15_2","doi-asserted-by":"crossref","unstructured":"Clark, H. H. and Brennan, S. E. (1991), \u2018Grounding in communication\u2019, in: Resnick, L. B., Levine, J., Behreno, S. D. (Eds.), Socially shared cognition.","DOI":"10.1037\/10096-006"},{"issue":"2","key":"2_CR16_2","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1016\/S1389-1286(01)00217-1","volume":"37","author":"S. Clau\u00df","year":"2001","unstructured":"Clau\u00df, S. and K\u00f6hntopp, M. (2001), \u2018Identity Managements and Its Support of Multilateral Security\u2019, Computer Networks 37 (2), Special Issue on Electronic Business Systems, pp. 205\u2013219.","journal-title":"Computer Networks"},{"issue":"9","key":"2_CR17_2","first-page":"26","volume":"14","author":"M. E. Clynes","year":"1960","unstructured":"Clynes, M. E. and Kline, N. S. (1960), \u2018Cyborgs and Space\u2019, Astronautics 14 (9), pp. 26\u201327 and 74\u201376.","journal-title":"Astronautics"},{"key":"2_CR18_2","unstructured":"Cunningham, W. and Leuf, B. (2001), The Wiki Way. Quick Collaboration on the Web, Addison-Wesley."},{"key":"2_CR19_2","unstructured":"Davis, M. (2008), \u2018Semantic Wave 2008: Industry Roadmap to Web 3.0 and Multibillion Dollar Market Opportunities \u2014 Executive Summary\u2019, Project10X report January 2008. url: http:\/\/www.project10x.com\/ ."},{"issue":"6","key":"2_CR20_2","first-page":"609","volume":"14","author":"S. Denning","year":"2001","unstructured":"Denning, S. (2001), \u2018The Springboard: How Storytelling Ignites Action in Knowledge-era Organizations\u2019, Journal of Organizational Change Management 14 (6), pp. 609\u2013614.","journal-title":"Journal of Organizational Change Management"},{"key":"2_CR21_2","unstructured":"Diogene (2002), \u2018Survey on Methods and Standards for Student Modelling\u2019, Diogene project, url: http:\/\/www.diogene.org\/archive.html ."},{"key":"2_CR22_2","unstructured":"Durand, A. (2002), \u2018Three Tiers of Identity\u2019, Digital Identity World, March 16, 2002."},{"issue":"2","key":"2_CR23_2","doi-asserted-by":"publisher","first-page":"239","DOI":"10.2307\/2393235","volume":"39","author":"J. Dutton","year":"1994","unstructured":"Dutton, J., Dukerich, J., Harquail, C. (1994), \u2018Organizational Images and Member Identification\u2019, Administrative Science Quarterly, 39 (2), pp 239\u2013263.","journal-title":"Administrative Science Quarterly"},{"key":"2_CR24_2","doi-asserted-by":"crossref","unstructured":"Epstein, R. (2007), \u2018The Truth About Online Dating\u2019, Scientific American Mind, February \/ March 2007, pp. 32\u201339.","DOI":"10.1038\/scientificamericanmind0207-28"},{"key":"2_CR25_2","unstructured":"Nabeth, T. (ed.) (2005b), FIDIS Deliverable D2.3: Models, Download: http:\/\/www.fidis.net\/ resources\/deliverables\/ ."},{"issue":"2\u20133","key":"2_CR26_2","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1023\/A:1026597308943","volume":"10","author":"J. Fink","year":"2000","unstructured":"Fink, J. and Kobsa, A., (2000), \u2018A Review and Analysis of Commercial User Modeling Servers for Personalization on the World Wide Web\u2019, User Modeling and User Adapted Interaction, 10 (2\u20133), pp. 209\u2013249.","journal-title":"User Modeling and User Adapted Interaction"},{"issue":"1\u20132","key":"2_CR27_2","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1023\/A:1011145532042","volume":"11","author":"G. Fischer","year":"2001","unstructured":"Fischer, G. (2001), \u2018User Modeling in Human-Computer Interaction\u2019, User Modeling and User Adaptive Interaction 11 (1\u20132), pp. 65\u201386.","journal-title":"User Modeling and User Adaptive Interaction"},{"key":"2_CR28_2","unstructured":"Gill, K. E. (2005), \u2018Blogging, RSS and the Information Landscape: A Look at Online News\u2019, In Proceedings of the 14th international WWW conference: 2nd annual workshop on weblogging ecosystem: aggregation, analysis and dynamics, 10 May 2005, Chiba, Japan."},{"issue":"2","key":"2_CR29_2","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1177\/0165551506062337","volume":"32","author":"S. Golder","year":"2006","unstructured":"Golder, S. and Huberman, B. A. (2006), \u2018Usage Patterns of Collaborative Tagging Systems\u2019, Journal of Information Science 32 (2), pp. 198\u2013208.","journal-title":"Journal of Information Science"},{"issue":"6","key":"2_CR30_2","doi-asserted-by":"publisher","first-page":"1360","DOI":"10.1086\/225469","volume":"78","author":"M. Granovetter","year":"1973","unstructured":"Granovetter, M. (1973), \u2018The Strength of Weak Ties\u2019, American Journal of Sociology 78 (6), pp. 1360\u201380.","journal-title":"American Journal of Sociology"},{"key":"2_CR31_2","unstructured":"Gruber, T. (2008), \u2018Ontology\u2019, in: Liu, L. and \u00d6zsu, M. T. (eds.), The Encyclopedia of Database Systems. Springer-Verlag."},{"key":"2_CR32_2","unstructured":"Halpin, H., Robu, V., Shepherd, H. (2006), \u2018The Dynamics and Semantics of Collaborative Tagging\u2019, Proceedings of the 16th international conference on World Wide Web, pp.211 \u2013 220."},{"key":"2_CR33_2","unstructured":"Hammond, J. S. (1976), Learning by the case method. HBS Publishing Division, Harvard Business School, Boston, MA, Case \u266f376\u2013241."},{"key":"2_CR34_2","doi-asserted-by":"crossref","unstructured":"Hammond, T., Hannay, T., Lund, B., Scott, J. (2005), \u2018Social Bookmarking Tools\u2019, D-Lib Magazine 11 (4), url: http:\/\/dlib.org\/dlib\/april05\/hammond\/04hammond.html .","DOI":"10.1045\/april2005-hammond"},{"key":"2_CR35_2","unstructured":"Hansen, M. and Pfitzmann, A. (2008), \u2018Anonymity, Unobservability, Pseudonymity, and Identity Management \u2014 A Proposal for Terminology\u2019, Working document, url: http:\/\/dud. inf.tu-dresden.de\/Anon_Terminology.shtml ."},{"key":"2_CR36_2","unstructured":"Hildebrandt, M. (2006), \u2018Privacy and Identity\u2019, in: Duff, A., Claes, E., Gutwirth, S. (eds.), Privacy and the criminal law, Antwerp\/Oxford, Intersentia, pp. 43\u201357."},{"key":"2_CR37_2","unstructured":"Holten, R. (2007), \u2018Deriving an IS-Theory from an Epistemological Position\u2019, Proceedings of the 18th Australasian Conference on Information Systems (ACIS 2007), Toowoomba, Australia."},{"key":"2_CR38_2","unstructured":"ICPP (2003), \u2018Independent Centre for Privacy Protection (ICPP) Schleswig-Holstein and Studio Notarile Genghini (SNG)\u2019, Identity Management Systems (IMS): Identification and Comparison, study prepared under contract for Institute for Prospective Technological Studies, Joint Research Centre Seville, Spain, Sept. 2003, url: http:\/\/www.daten-schutzzentrum.de\/idmanage\/study\/ICPP_SNG_IMS-Study.pdf ."},{"key":"2_CR39_2","unstructured":"ISO (1999), ISO IS 15408, 1999, url: http:\/\/www.commoncriteria.org\/ ."},{"key":"2_CR40_2","unstructured":"Jaquet-Chiffelle, D.-O., Benoist, E., Anrig, B. (eds.) (2006), FIDIS Deliverable 2.6: Identity in a Networked World \u2014 Use Cases and Scenarios, Download: http:\/\/www.fidis.net\/ resources\/networked-world\/ ."},{"key":"2_CR41_2","unstructured":"Kahney, L. (2004), \u2018Social Nets Not Making Friends\u2019, Wired magazine, January. 28, 2004, url: http:\/\/www.wired.com\/culture\/lifestyle\/news\/2004\/01\/62070 ."},{"key":"2_CR42_2","doi-asserted-by":"crossref","unstructured":"Kay, J. (2000), \u2018User modeling for adaptation\u2019, in Constantine, S. (ed.), User Interfaces for All, Human Factors Series, Lawrence Erlbaum Associates, pp. 271\u2013294.","DOI":"10.1201\/9780429285059-14"},{"key":"2_CR43_2","unstructured":"Klamma, R., Y., Cao, M., Spaniol (2007), \u2018Watching the Blogosphere: Knowledge Sharing in the Web 2.0\u2019, Proceedings of the International Conference on Weblogs and Social Media, Boulder, Colorado, USA, pp. 105\u2013112."},{"issue":"2","key":"2_CR44_2","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1017\/S0269888901000108","volume":"16","author":"A. Kobsa","year":"2000","unstructured":"Kobsa, A., Koenemann, J., Pohl, W. (2000), \u2018Personalized hypermedia presentation techniques for improving online customer relationships\u2019, The Knowledge Engineering Review 16 (2), pp. 111\u2013155.","journal-title":"The Knowledge Engineering Review"},{"key":"2_CR45_2","doi-asserted-by":"crossref","unstructured":"Kogut, B. (2008), Knowledge, Options, and Institutions. Oxford University Press.","DOI":"10.1093\/oso\/9780199282524.001.0001"},{"key":"2_CR46_2","unstructured":"Korotov, K. (2004), \u2018\u201cNeither Here nor There\u201d or \u201cBoth Here and There\u201d: Experiencing Liminality and Playing with Identity\u2019, Academy of Management Conference, New Or leans, August 6\u201311, 2004."},{"key":"2_CR47_2","unstructured":"Lelic, S. (2002), \u2018Fuel Your Imagination. KM and the Art of Storytelling\u2019, Knowledge Management 5 (4)."},{"key":"2_CR48_2","volume-title":"Code and Other Laws of Cyberspace","author":"L. Lessig","year":"1999","unstructured":"Lessig, L. (1999), Code and Other Laws of Cyberspace. New York: Basic Books."},{"key":"2_CR49_2","unstructured":"Lih, A. (2004), \u2018Wikipedia as Participatory Journalism: Reliable Sources? Metrics for evaluating collaborative media as a news alternative\u2019, 5th International Symposium on Online Journalism at the University of Texas at Austin."},{"key":"2_CR50_2","volume-title":"Position Paper, Tagging, Taxonomy, Flickr, Article, ToRead","author":"C. Marlow","year":"2006","unstructured":"Marlow, C., Naaman, M., Boyd, D., Davis, M. (2006), \u2018Position Paper, Tagging, Taxonomy, Flickr, Article, ToRead\u2019, Proceedings of Hypertext 2006, New York: ACM Press."},{"issue":"3","key":"2_CR51_2","first-page":"21","volume":"47","author":"A. P. McAfee","year":"2006","unstructured":"McAfee, A. P. (2006), \u2018Enterprise 2.0: The Dawn of Emergent Collaboration\u2019, Sloan Management Review 47 (3), pp. 21\u201328.","journal-title":"Sloan Management Review"},{"issue":"9","key":"2_CR52_2","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1145\/1105664.1105676","volume":"3","author":"D. Millen","year":"2005","unstructured":"Millen, D., Feinberg, J., Kerr, B. (2005), \u2018Social Bookmarking in the Enterprise\u2019, ACM Queue 3 (9), pp. 28\u201335.","journal-title":"ACM Queue"},{"key":"2_CR53_2","unstructured":"Mathes, A. (2004), \u2018Folksonomies \u2014 Cooperative Classification and Communication Through Shared Metadata\u2019, Graduate School of Library and Information Science, url: http:\/\/www. adammathes.com\/academic\/computer-mediated-communication\/folksonomies.html ."},{"key":"2_CR54_2","doi-asserted-by":"crossref","unstructured":"McLellan, H. (2002), \u2018Introduction to Corporate Storytelling\u2019, url: http:\/\/tech-head.com\/ cstory1.htm .","DOI":"10.1016\/S0140-6736(02)11795-8"},{"key":"2_CR55_2","doi-asserted-by":"crossref","unstructured":"Mennecke, B.E., McNeill, D., Ganis, M., Roche, E., Konsynski, B., Bray, D., Lester, Townsend, A.M. (2008), \u2018Second Life and other Virtual Worlds: A Roadmap for Research\u2019, Communications of the Association for Information Systems 22 (article 20), pp. 371\u2013388.","DOI":"10.17705\/1CAIS.02220"},{"key":"2_CR56_2","unstructured":"Modini (2005), \u2018Modinis Study on Identity Management\u2019, in eGovernment, Common Terminological Framework for Interoperable Electronic Identity Management \u2014 Consultation Paper, v2.01, 23 November 2005, url: https:\/\/www.cosic.esat.kuleuven.be\/modinis- idm\/twiki\/bin\/view.cgi\/Main\/GlossaryDoc ."},{"key":"2_CR57_2","unstructured":"Naaman, M. (2006), \u2018Why Do Tagging Systems Work?\u2019, Conference on Human Factors in Computing Systems (CHI 2006), Panel session, pp. 36\u201339."},{"key":"2_CR58_2","doi-asserted-by":"crossref","unstructured":"Nabeth, T., Angehrn, A. A., Balakrishnan, R. (2004), \u2018Integrating \u201cContext\u201d in e-Learning Systems Design\u2019, Proceedings of IEEE International Conference on Advanced Learning Technologies (ICALT 2004), pp. 355\u2013359.","DOI":"10.1109\/ICALT.2004.1357436"},{"key":"2_CR59_2","unstructured":"Nabeth, T. (ed.) (2005), FIDIS Deliverable D2.3: Models, Download: http:\/\/www.fidis.net\/ resources\/deliverables\/ ."},{"key":"2_CR60_2","unstructured":"Nabeth, T. and Hildebrandt, M. (eds.) (2005), FIDIS Deliverable D2.1: Inventory of Topics and Clusters, Download: http:\/\/www.fidis.net\/resources\/deliverables\/ ."},{"key":"2_CR61_2","unstructured":"Nabeth, T., Karlsson, H., Angehrn, A. A., Maisonneuve, N. (2008), \u2018A Social Network Platform for Vocational Learning in the ITM Worldwide Network\u2019, Proceedings of IST Africa 2008."},{"issue":"12","key":"2_CR62_2","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1145\/1035134.1035163","volume":"47","author":"B. A. Nardi","year":"2004","unstructured":"Nardi, B. A., Schiano D. J., Gumbrecht, M. Swartz, L. (2004), \u2018Why We Blog\u2019, Communications of the ACM 47 (12), pp. 41\u201346.","journal-title":"Communications of the ACM"},{"key":"2_CR63_2","unstructured":"Nisbett, R. (2003), The Geography of Thought: How Asians and Westerners Think Differently...and Why. Reed Business Information, Inc."},{"key":"2_CR64_2","doi-asserted-by":"crossref","DOI":"10.1093\/oso\/9780195092691.001.0001","volume-title":"The Knowledge-Creating Company","author":"I. Nonaka","year":"1995","unstructured":"Nonaka, I. and Takeuchi, H. (1995), The Knowledge-Creating Company. New York: Oxford University Press."},{"key":"2_CR65_2","unstructured":"O'Reilly, T. (2005), \u2018What Is Web 2.0 Design Patterns and Business Models for the Next Generation of Software\u2019, 30 September 2005, url: http:\/\/www.oreillynet.com\/pub\/a\/ oreilly\/tim\/news\/2005\/09\/30\/what-is-web-20.html ."},{"key":"2_CR66_2","unstructured":"Perez, S. (2008), \u2018Real People Don't Have Time for Social Media\u2019, ReadWriteWeb, April 16, 2008, url: http:\/\/www.readwriteweb.com\/archives\/real_people_dont_have_time_for_social_media.php ."},{"key":"2_CR67_2","doi-asserted-by":"crossref","unstructured":"Pratt, M. G. (1998), \u2018To Be Or Not To Be: Central Questions in Organizational Identification\u2019, in: David A. W., Paul G. (eds.), Identity in Organizations, Thousand Oaks: Sage, pp. 171\u2013207.","DOI":"10.4135\/9781452231495.n6"},{"key":"2_CR68_2","doi-asserted-by":"crossref","first-page":"243","DOI":"10.1017\/CBO9780511813740.012","volume-title":"Psychological aspects of cyberspace: Theory, research, applications","author":"S. Rafaeli","year":"2008","unstructured":"Rafaeli, S. and Ariel, Y. (2008), \u2018Online motivational factors: Incentives for participation and contribution in Wikipedia\u2019, in: Azy, B. (ed.), Psychological aspects of cyberspace: Theory, research, applications, Cambridge, UK: Cambridge University Press, pp. 243\u2013 267, url: http:\/\/gsb.haifa.ac.il\/~sheizaf\/cyberpsych\/11-RafaeliandAriel.pdf ."},{"key":"2_CR69_2","doi-asserted-by":"crossref","unstructured":"Razmerita, L., (2004), \u2018User modeling and personalization of the Knowledge Management Systems\u2019, Adaptable and Adaptive Hypermedia, Idea Group Publishing.","DOI":"10.4018\/978-1-59140-567-2.ch012"},{"key":"2_CR70_2","doi-asserted-by":"crossref","unstructured":"Resnick, P. and Zeckhauser, R. (2002), \u2018Trust Among Strangers in Internet Transactions: Empirical Analysis of eBay's Reputation System\u2019, The Economics of the Internet and E- Commerce, pp. 127\u2013157.","DOI":"10.1016\/S0278-0984(02)11030-3"},{"key":"2_CR71_2","volume-title":"Oneself as another","author":"P. Ricoeur","year":"1992","unstructured":"Ricoeur, P. (1992), Oneself as another. Chicago and London: University of Chicago Press."},{"key":"2_CR72_2","volume-title":"Diffusion of Innovations","author":"E. Rogers","year":"2003","unstructured":"Rogers, E. (2003), Diffusion of Innovations (5th ed.). New York: Free Press.","edition":"5"},{"key":"2_CR73_2","doi-asserted-by":"crossref","unstructured":"Sen, S., Harper, F. M., LaPitz, A., Riedl, J. (2007), \u2018The Quest for Quality Tags\u2019, Proceedings of the 2007 international ACM conference on Supporting group work, pp. 361\u2013370.","DOI":"10.1145\/1316624.1316678"},{"key":"2_CR74_2","unstructured":"Snowden, D. (2001), \u2018Narrative patterns: the perils and possibilities of using story in or ganisations\u2019, Knowledge Management, 4 (10)."},{"issue":"1","key":"2_CR75_2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1142\/S021964920200011X","volume":"1","author":"D. Snowden","year":"2002","unstructured":"Snowden, D. (2002), \u2018Narrative patterns: uses of story in the third age of knowledge management\u2019, Journal of information and knowledge management, 1 (1), pp. 1\u20136.","journal-title":"Journal of information and knowledge management"},{"key":"2_CR76_2","unstructured":"Sole, D. and Wilson, D. (2002), \u2018Storytelling in organizations: The power and traps of using stories to share knowledge in organizations\u2019, Boston: LILA, Harvard Graduate School of Education, url: http:\/\/lila.pz.harvard.edu\/_upload\/lib\/ACF14F3.pdf ."},{"key":"2_CR77_2","doi-asserted-by":"crossref","unstructured":"Sproule, S. and Archer, N. (2007), \u2018Defining Identity Theft\u2019, Eighth World Congress on the Management of eBusiness (WCMeB 2007), pp. 20\u201320.","DOI":"10.1109\/WCMEB.2007.5"},{"issue":"4","key":"2_CR78_2","doi-asserted-by":"publisher","first-page":"387","DOI":"10.1177\/030631289019003001","volume":"19","author":"S. L. Star","year":"1989","unstructured":"Star, S. L. and Griesemer, J.R. (1989), \u2018Institutional Ecology, \u201cTranslations\u201d and Boundary Objects: Amateurs and Professionals in Berkeley's Museum of Vertebrate Zoology\u2019, 1907\u201339; Social Studies of Science 19 (4), pp. 387\u2013420.","journal-title":"Social Studies of Science"},{"issue":"1\u20132","key":"2_CR79_2","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1023\/A:1011144232235","volume":"11","author":"C. Stephanidis","year":"2001","unstructured":"Stephanidis, C. (2001), \u2018Adaptive Techniques for Universal Access\u2019, User Modeling and User-Adapted Interaction 11 (1\u20132), pp. 159\u2013179.","journal-title":"User Modeling and User-Adapted Interaction"},{"issue":"5","key":"2_CR80_2","doi-asserted-by":"publisher","first-page":"420","DOI":"10.1108\/13673270210450388","volume":"6","author":"K. E. Sveiby","year":"2002","unstructured":"Sveiby, K. E. and Simons, R. (2002), \u2018Collaborative climate and effectiveness of knowledge work: an empirical study\u2019, Journal of Knowledge Management 6 (5), pp. 420\u2013433.","journal-title":"Journal of Knowledge Management"},{"issue":"4","key":"2_CR81_2","doi-asserted-by":"publisher","first-page":"863","DOI":"10.1147\/sj.404.0863","volume":"40","author":"J. C. Thomas","year":"2001","unstructured":"Thomas, J. C., Kellogg, W. A., Erickson, T. (2001), \u2018The knowledge management puzzle: human and social factors in knowledge management\u2019, IBM System Journal 40 (4), pp. 863\u2013884.","journal-title":"IBM System Journal"},{"issue":"1","key":"2_CR82_2","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1016\/j.serrev.2006.11.002","volume":"33","author":"M. Tumlin","year":"2007","unstructured":"Tumlin, M., Harris, S. R., Buchanan, H., Schmidt, K (2007), \u2018Collectivism vs. individualism in a wiki world: librarians respond to Jaron Lanier's essay \u2018digital Maoism: the hazards of the new online collectivism, (Johnson K., ed.)\u2019, Serials Review 33 (1), pp. 45\u201353.","journal-title":"Serials Review"},{"issue":"1","key":"2_CR83_2","doi-asserted-by":"crossref","first-page":"70","DOI":"10.4018\/irmj.2006010104","volume":"19","author":"C. Wagner","year":"2006","unstructured":"Wagner, C. (2006), \u2018Breaking the Knowledge Acquisition Bottleneck through Conversational Knowledge Management\u2019, Information Resources Management Journal, 19 (1), pp. 70\u201383.","journal-title":"Information Resources Management Journal"},{"key":"2_CR84_2","doi-asserted-by":"crossref","unstructured":"Wilkinson, D. M. and Huberman B. A. (2007), \u2018Assessing the Value of Cooperation in Wikipedia\u2019, First Monday 12 (4), url: http:\/\/www.firstmonday.org\/issues\/issue12_4\/ wilkinson\/ .","DOI":"10.5210\/fm.v12i4.1763"}],"container-title":["The Future of Identity in the Information Society"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-01820-6_2.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,16]],"date-time":"2024-03-16T13:04:09Z","timestamp":1710594249000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-01820-6_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783540884804","9783642018206"],"references-count":84,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-01820-6_2","relation":{},"subject":[],"published":{"date-parts":[[2009]]}}}