The Business-Technology Weave:

online identity


June 27, 2011  7:45 AM

Social Intelligence, Part II

Posted by: David Scott
Add new tag, internet security, interviewing, job search, job searching, online identity, online reputation, online security, online wellness, personal security,, social intelligence, social intelligence corporation, social network security, social networking


Today’s article follows on to yesterday’s

March 31, 2011  12:08 PM

Social Networking Redux: Perception Management

Posted by: David Scott
best business practice, business adaptability, business agility, business and IT policy, business and IT, business and IT solutions, business and social networking, business attitude, business beliefs, business breach, business challenge, business change, business communication, business protocol, facebook, facebook peril, myspace, myspace peril, online challenge, online identity, online security, perception management, public relations, small and medium business, small business and social networking, SMB, SMB and social networking, social networking, social networking peril, youtube peril


Back in the days of my misspent youth, as CIO in a Fortune100...

April 6, 2010  12:20 PM

What is Being Done in the Name of Your Domain?

Posted by: David Scott
business security, data security, domain, employee security, employer security, facebook, IT security, linkedin, online identity, twitter


These days a company’s personnel have two or more identities:  There is the usual professional “company”...


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: