When.com Web Search

Search results

  1. Results From The WOW.Com Content Network
  2. Organizational identity - Wikipedia

    en.wikipedia.org/wiki/Organizational_identity

    According to the work of Albert and Whetten, the task of managing organizational identity is often neglected until an organization reaches a point where it is unavoidable. This may happen in situations when an organization has experienced significant growth, downsizing, or fostered multiple identities that have become irreconcilable.

  3. Decisional balance sheet - Wikipedia

    en.wikipedia.org/wiki/Decisional_balance_sheet

    John C. Norcross is among the psychologists who have simplified the balance sheet to four cells: the pros and cons of changing, for self and for others. [19] Similarly, a number of psychologists have simplified the balance sheet to a four-cell format consisting of the pros and cons of the current behaviour and of a changed behaviour. [20]

  4. Job characteristic theory - Wikipedia

    en.wikipedia.org/wiki/Job_characteristic_theory

    Job characteristics theory is a theory of work design.It provides “a set of implementing principles for enriching jobs in organizational settings”. [1] The original version of job characteristics theory proposed a model of five “core” job characteristics (i.e. skill variety, task identity, task significance, autonomy, and feedback) that affect five work-related outcomes (i.e ...

  5. Identity safety cues - Wikipedia

    en.wikipedia.org/wiki/Identity_safety_cues

    In fact, some work has suggested that the benefits of identity safety cues extend to members of non-stigmatized groups. [5] For example, implementation of identity safety cues within a university context has been shown to increase student engagement, efficacy, and reduce the average number of student absences for all students, but especially ...

  6. The Pros and Cons of Identity Monitoring Services - AOL

    www.aol.com/news/pros-cons-identity-monitoring...

    If you're concerned about becoming the victim of identity theft or another form of financial fraud, you may be wondering whether you should invest in an identity monitoring service. Plus, such ...

  7. Identity and access management - Wikipedia

    en.wikipedia.org/wiki/Identity_and_Access_Management

    Identity management (ID management) – or identity and access management (IAM) – is the organizational and technical processes for first registering and authorizing access rights in the configuration phase, and then in the operation phase for identifying, authenticating and controlling individuals or groups of people to have access to applications, systems or networks based on previously ...

  8. Digital identity - Wikipedia

    en.wikipedia.org/wiki/Digital_identity

    A digital identity is data stored on computer systems relating to an individual, organization, application, or device. For individuals, it involves the collection of personal data that is essential for facilitating automated access to digital services, confirming one's identity on the internet, and allowing digital systems to manage interactions between different parties.

  9. Psychology of self and identity - Wikipedia

    en.wikipedia.org/.../Psychology_of_self_and_identity

    The psychology of self and identity is a subfield of Psychology that moves psychological research “deeper inside the conscious mind of the person and further out into the person’s social world.” [1] The exploration of self and identity subsequently enables the influence of both inner phenomenal experiences and the outer world in relation to the individual to be further investigated.