<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>2007-7467</journal-id>
<journal-title><![CDATA[RIDE. Revista Iberoamericana para la Investigación y el Desarrollo Educativo]]></journal-title>
<abbrev-journal-title><![CDATA[RIDE. Rev. Iberoam. Investig. Desarro. Educ]]></abbrev-journal-title>
<issn>2007-7467</issn>
<publisher>
<publisher-name><![CDATA[Centro de Estudios e Investigaciones para el Desarrollo Docente A.C.]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S2007-74672021000100169</article-id>
<article-id pub-id-type="doi">10.23913/ride.v11i22.943</article-id>
<title-group>
<article-title xml:lang="es"><![CDATA[Diseño y validación de una escala para medir la gestión de la identidad digital]]></article-title>
<article-title xml:lang="en"><![CDATA[Design and Validation of a Scale to Measure Digital Identity Management]]></article-title>
<article-title xml:lang="pt"><![CDATA[Projeto e validação de uma escala para medir o gerenciamento de identidade digital]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Huerta Patraca]]></surname>
<given-names><![CDATA[Gustavo Antonio]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Torres Gastelú]]></surname>
<given-names><![CDATA[Carlos Arturo]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Lagunes Domínguez]]></surname>
<given-names><![CDATA[Agustín]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
</contrib-group>
<aff id="Af1">
<institution><![CDATA[,Universidad Veracruzana Facultad de Pedagogía ]]></institution>
<addr-line><![CDATA[ ]]></addr-line>
<country>Mexico</country>
</aff>
<aff id="Af2">
<institution><![CDATA[,Universidad Veracruzana  ]]></institution>
<addr-line><![CDATA[ ]]></addr-line>
<country>Mexico</country>
</aff>
<aff id="Af3">
<institution><![CDATA[,Universidad Veracruzana  ]]></institution>
<addr-line><![CDATA[ ]]></addr-line>
<country>Mexico</country>
</aff>
<pub-date pub-type="pub">
<day>00</day>
<month>06</month>
<year>2021</year>
</pub-date>
<pub-date pub-type="epub">
<day>00</day>
<month>06</month>
<year>2021</year>
</pub-date>
<volume>11</volume>
<numero>22</numero>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_arttext&amp;pid=S2007-74672021000100169&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_abstract&amp;pid=S2007-74672021000100169&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_pdf&amp;pid=S2007-74672021000100169&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="es"><p><![CDATA[Resumen La gestión de la identidad digital implica un proceso permanente y consciente del manejo de información personal y contenido que se comparte en Internet, con miras a proteger la privacidad y reputación digital. El objetivo del artículo es describir el proceso de diseño y validación de la escala de percepción titulada IDentifica2.0, creada para medir la gestión de la identidad digital, instrumento empleado para la investigación doctoral en Sistemas y Ambientes Educativos de la Universidad Veracruzana, México. La escala de Likert desarrollada contiene cinco dimensiones: creación de la identidad digital, visibilidad, privacidad y seguridad en Internet, reputación digital y efectos de la identidad digital en el ámbito personal. Se aplicó a 319 estudiantes de la licenciatura en Pedagogía de la Universidad Veracruzana (88 % de mujeres y 12 % de mujeres). Se realizó un análisis factorial exploratorio (AFE) y análisis factorial confirmatorio (AFC) para determinar su validez, que derivó en la eliminación de ítems con baja o nula correlación. Como parte de los resultados, se obtuvo un alfa de 0.80 y un índice Kaiser-Meyer-Olkin (KMO) de 0.728 global para las cinco subescalas. La versión final contiene 32 ítems agrupados en cinco factores. La escala IDentifica2.0 cuenta con un nivel aceptable de confiabilidad y validez para medir la gestión de la identidad digital, y abona al análisis de esta competencia digital.]]></p></abstract>
<abstract abstract-type="short" xml:lang="en"><p><![CDATA[Abstract Digital identity management involves a permanent and conscious process of handling personal information and content that is shared on the Internet, protecting privacy and digital reputation. The objective of the article is to describe the design and validation process of the perception scale titled IDentifica2.0, created to measure the management of digital identity, an instrument used for doctoral research in Educational Systems and Environments of the Universidad Veracruzana. The developed Likert scale contains five dimensions: creation of digital identity, visibility, privacy and security on the Internet, digital reputation, and effects of digital identity in the personal sphere. It was applied to 319 students (88% women and 12% women) of the Bachelor of Pedagogy at the Universidad Veracruzana (México). An exploratory factor analysis (AFE) and confirmatory factor analysis (AFC) were performed to determine its validity, which results in the elimination of elements with little or no correlation. As part of the results, an alpha of 0.80 and a Kaiser-Meyer-Olkin (KMO) index of 0.728 were obtained globally for the five subscales. The final version contains 32 items grouped into five factors. The IDentifica2.0 scale has an acceptable level of reliability and validity to measure the management of digital identity, contributing to the analysis of this digital competence]]></p></abstract>
<abstract abstract-type="short" xml:lang="pt"><p><![CDATA[Resumo A gestão da identidade digital implica um processo permanente e consciente de tratamento da informação pessoal e dos conteúdos partilhados na Internet, com vista à protecção da privacidade e da reputação digital. O objetivo do artigo é descrever o processo de desenho e validação da escala de percepção intitulada IDentifica2.0, criada para medir a gestão da identidade digital, instrumento utilizado para pesquisa de doutorado em Sistemas e Ambientes Educacionais da Universidade Veracruzana, México. A escala Likert desenvolvida contém cinco dimensões: criação da identidade digital, visibilidade, privacidade e segurança na Internet, reputação digital e efeitos da identidade digital na esfera pessoal. Foi aplicado a 319 alunos da licenciatura em Pedagogia da Universidade Veracruzana (88% mulheres e 12% mulheres). Uma análise fatorial exploratória (AFE) e análise fatorial confirmatória (CFA) foram realizadas para determinar sua validade, o que levou à eliminação de itens com baixa ou nenhuma correlação. Como parte dos resultados, um alfa de 0,80 e um índice Kaiser-Meyer-Olkin (KMO) de 0,728 foram obtidos globalmente para as cinco subescalas. A versão final contém 32 itens agrupados em cinco fatores. A escala IDentifica2.0 tem um nível aceitável de confiabilidade e validade para medir a gestão da identidade digital e apóia a análise dessa competência digital.]]></p></abstract>
<kwd-group>
<kwd lng="es"><![CDATA[confiabilidad]]></kwd>
<kwd lng="es"><![CDATA[escala de percepción]]></kwd>
<kwd lng="es"><![CDATA[estudiante universitario]]></kwd>
<kwd lng="es"><![CDATA[identidad digital]]></kwd>
<kwd lng="es"><![CDATA[instrumento de medida]]></kwd>
<kwd lng="es"><![CDATA[medición]]></kwd>
<kwd lng="es"><![CDATA[validez]]></kwd>
<kwd lng="en"><![CDATA[reliability]]></kwd>
<kwd lng="en"><![CDATA[perception scale]]></kwd>
<kwd lng="en"><![CDATA[university student]]></kwd>
<kwd lng="en"><![CDATA[digital identity]]></kwd>
<kwd lng="en"><![CDATA[measurement instrument]]></kwd>
<kwd lng="en"><![CDATA[measurement]]></kwd>
<kwd lng="en"><![CDATA[validity]]></kwd>
<kwd lng="pt"><![CDATA[confiabilidade]]></kwd>
<kwd lng="pt"><![CDATA[escala de percepção]]></kwd>
<kwd lng="pt"><![CDATA[estudante universitário]]></kwd>
<kwd lng="pt"><![CDATA[identidade digital]]></kwd>
<kwd lng="pt"><![CDATA[instrumento de medida]]></kwd>
<kwd lng="pt"><![CDATA[medida]]></kwd>
<kwd lng="pt"><![CDATA[validade]]></kwd>
</kwd-group>
</article-meta>
</front><back>
<ref-list>
<ref id="B1">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Aced]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Arqués]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
<name>
<surname><![CDATA[Benítez]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Llodrà]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
<name>
<surname><![CDATA[Sanagustín]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
</person-group>
<source><![CDATA[Visibilidad: cómo gestionar la reputación en Internet]]></source>
<year>2009</year>
<publisher-loc><![CDATA[España ]]></publisher-loc>
<publisher-name><![CDATA[Gestión 2000]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B2">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Adriaanse]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Rensleigh]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[E-visibility of environmental science researchers at the University of South Africa]]></article-title>
<source><![CDATA[South African Journal of Libraries and Information Science]]></source>
<year>2017</year>
<volume>83</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>30-41</page-range></nlm-citation>
</ref>
<ref id="B3">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Aguilar]]></surname>
<given-names><![CDATA[D. E.]]></given-names>
</name>
<name>
<surname><![CDATA[Said]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Identidad y subjetividad en las redes sociales virtuales: caso de Facebook]]></article-title>
<source><![CDATA[Zona Próxima]]></source>
<year>2010</year>
<numero>12</numero>
<issue>12</issue>
<page-range>190-207</page-range></nlm-citation>
</ref>
<ref id="B4">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ahlquist]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The Digital Identity of Student Affairs Professionals]]></article-title>
<source><![CDATA[New Directions for Student Services]]></source>
<year>2016</year>
<volume>2016</volume>
<numero>155</numero>
<issue>155</issue>
<page-range>29-46</page-range></nlm-citation>
</ref>
<ref id="B5">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ainsa]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[College students' digital identity: perceptions towards employment and career]]></article-title>
<source><![CDATA[College Student Journal]]></source>
<year>2016</year>
<volume>50</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>47-53</page-range></nlm-citation>
</ref>
<ref id="B6">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Baladán]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
<name>
<surname><![CDATA[Hernández]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<source><![CDATA[Nuevas manifestaciones del relacionamiento laboral: E-Recruiting, reputación digital, trabajo 3.0 y relaciones laborales en la economía colaborativa]]></source>
<year>2016</year>
<conf-name><![CDATA[ XVISimposio Argentino de Informática y Derecho (SID 2016)-JAIIO 45]]></conf-name>
<conf-date>5 al 9 de septiembre de 2016</conf-date>
<conf-loc>Buenos Aires </conf-loc>
</nlm-citation>
</ref>
<ref id="B7">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Beck]]></surname>
<given-names><![CDATA[E. N.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The invisible digital identity: Assemblages in digital networks]]></article-title>
<source><![CDATA[Computers and Composition]]></source>
<year>2015</year>
<volume>35</volume>
<page-range>125-40</page-range></nlm-citation>
</ref>
<ref id="B8">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Bjerede]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Managing Student Identities in the Digital Era]]></article-title>
<source><![CDATA[THE Journal (Technological Horizons in Education)]]></source>
<year>2015</year>
<volume>42</volume>
<numero>6</numero>
<issue>6</issue>
<page-range>6</page-range></nlm-citation>
</ref>
<ref id="B9">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Bozkurt]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Tu]]></surname>
<given-names><![CDATA[C. H.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Digital identity formation: Socially being real and present on digital networks]]></article-title>
<source><![CDATA[Educational Media International]]></source>
<year>2016</year>
<volume>53</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>153-67</page-range></nlm-citation>
</ref>
<ref id="B10">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Brown]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
</person-group>
<source><![CDATA[Confirmatory Factor Analysis for Applied Research]]></source>
<year>2015</year>
<edition>2</edition>
<publisher-loc><![CDATA[New York, United States ]]></publisher-loc>
<publisher-name><![CDATA[The Guilford Press]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B11">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Byrne]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
</person-group>
<source><![CDATA[Structural Equation Modeling with AMOS]]></source>
<year>2010</year>
<edition>2</edition>
<publisher-loc><![CDATA[New York, United States ]]></publisher-loc>
<publisher-name><![CDATA[Routledge Taylor &amp; Francis Group]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B12">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Castañeda]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Camacho]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Desvelando nuestra identidad digital]]></article-title>
<source><![CDATA[El Profesional de la Información]]></source>
<year>2012</year>
<volume>21</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>354-60</page-range></nlm-citation>
</ref>
<ref id="B13">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Castillejos]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
<name>
<surname><![CDATA[Torres]]></surname>
<given-names><![CDATA[C. A.]]></given-names>
</name>
<name>
<surname><![CDATA[Lagunes]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[La seguridad en las competencias digitales de los millennials]]></article-title>
<source><![CDATA[Apertura]]></source>
<year>2016</year>
<volume>8</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>54-69</page-range></nlm-citation>
</ref>
<ref id="B14">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Cea]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<source><![CDATA[Análisis multivariable. Teoría y práctica en la investigación social]]></source>
<year>2004</year>
<publisher-loc><![CDATA[Madrid, España ]]></publisher-loc>
<publisher-name><![CDATA[Síntesis]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B15">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[D&#8217;Antona]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Kevorkian]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Russom]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Sexting, Texting, Cyberbullying and Keeping Youth Safe Online]]></article-title>
<source><![CDATA[Journal of Social Sciences]]></source>
<year>2010</year>
<volume>6</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>523-8</page-range></nlm-citation>
</ref>
<ref id="B16">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Dalton]]></surname>
<given-names><![CDATA[J. C.]]></given-names>
</name>
<name>
<surname><![CDATA[Crosby]]></surname>
<given-names><![CDATA[P. C.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Digital identity: How social media are influencing student learning and development in college]]></article-title>
<source><![CDATA[Journal of College and Character]]></source>
<year>2013</year>
<volume>14</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>1-4</page-range></nlm-citation>
</ref>
<ref id="B17">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Dans]]></surname>
<given-names><![CDATA[I.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Identidad digital de los adolescentes: la narrativa del yo]]></article-title>
<source><![CDATA[Revista de Estudios e Investigación en Psicología y Educación]]></source>
<year>2015</year>
<numero>13</numero>
<issue>13</issue>
<page-range>1-4</page-range></nlm-citation>
</ref>
<ref id="B18">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Davis]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Young people&#8217;s digital lives: The impact of interpersonal relationships and digital media use on adolescents&#8217; sense of identity]]></article-title>
<source><![CDATA[Computers in Human Behavior]]></source>
<year>2013</year>
<volume>29</volume>
<numero>6</numero>
<issue>6</issue>
<page-range>2281-93</page-range></nlm-citation>
</ref>
<ref id="B19">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[de Frutos]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
<name>
<surname><![CDATA[Vázquez]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Adolescentes y jóvenes en el entorno digital: Análisis de su discurso sobre usos, percepción de riesgo y mecanismos de protección]]></article-title>
<source><![CDATA[doxa.comunicación]]></source>
<year>2014</year>
<numero>15</numero>
<issue>15</issue>
<page-range>57-79</page-range></nlm-citation>
</ref>
<ref id="B20">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[DeVellis]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
</person-group>
<source><![CDATA[Scale Development. Theory and Applications]]></source>
<year>2012</year>
<publisher-loc><![CDATA[New York, United States ]]></publisher-loc>
<publisher-name><![CDATA[SAGE]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B21">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Dutot]]></surname>
<given-names><![CDATA[V.]]></given-names>
</name>
<name>
<surname><![CDATA[Castellano]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Designing a measurement scale for e-reputation]]></article-title>
<source><![CDATA[Corporate Reputation Review]]></source>
<year>2015</year>
<volume>18</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>294-313</page-range></nlm-citation>
</ref>
<ref id="B22">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Fernández]]></surname>
<given-names><![CDATA[C. S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[La vida privada en la sociedad digital. La exposición pública de los jóvenes en internet]]></article-title>
<source><![CDATA[Aposta. Revista de Ciencias Sociales]]></source>
<year>2014</year>
<numero>61</numero>
<issue>61</issue>
<page-range>1-32</page-range></nlm-citation>
</ref>
<ref id="B23">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ferrari]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<source><![CDATA[DIGCOMP: A Framework for Developing and Understanding Digital Competence in Europe]]></source>
<year>2013</year>
<publisher-loc><![CDATA[Sevilla, España ]]></publisher-loc>
<publisher-name><![CDATA[Joint Research Centre of the European Commission]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B24">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Gabrielidis]]></surname>
<given-names><![CDATA[A. L.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Régimen de visibilidad y vigilancia en la era de la identidad digital]]></article-title>
<source><![CDATA[Revista Teknokultura]]></source>
<year>2015</year>
<volume>12</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>473-99</page-range></nlm-citation>
</ref>
<ref id="B25">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Galera]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Hurtado]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Fernández]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Las redes sociales en la cultura digital: percepción, participación, movilización]]></article-title>
<source><![CDATA[Revista de la Asociación Española de Investigación de la Comunicación]]></source>
<year>2014</year>
<volume>1</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>12-8</page-range></nlm-citation>
</ref>
<ref id="B26">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Gamero]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[La configuración de la identidad digital]]></article-title>
<source><![CDATA[Nota Enterie]]></source>
<year>2009</year>
<numero>131</numero>
<issue>131</issue>
<page-range>1-6</page-range></nlm-citation>
</ref>
<ref id="B27">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[García]]></surname>
<given-names><![CDATA[M. D.]]></given-names>
</name>
<name>
<surname><![CDATA[del Olmo]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[del Hoyo]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<source><![CDATA[Jóvenes, privacidad y dependencia en las redes sociales]]></source>
<year>2017</year>
<conf-name><![CDATA[ IICongreso Internacional Move net sobre Movimientos Sociales y TIC]]></conf-name>
<conf-date>25 al 27 de octubre de 2017</conf-date>
<conf-loc>Sevilla </conf-loc>
</nlm-citation>
</ref>
<ref id="B28">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Georges]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[L'identité numérique sous emprise culturelle]]></article-title>
<source><![CDATA[Les Cahiers du numérique]]></source>
<year>2011</year>
<volume>7</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>31-48</page-range></nlm-citation>
</ref>
<ref id="B29">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Giones]]></surname>
<given-names><![CDATA[V. A.]]></given-names>
</name>
<name>
<surname><![CDATA[Serrat]]></surname>
<given-names><![CDATA[B. M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[La gestión de la identidad digital: una nueva habilidad informacional y digital]]></article-title>
<source><![CDATA[BiD: Textos Universitaris de Biblioteconomia i Documentació]]></source>
<year>2010</year>
<numero>24</numero>
<issue>24</issue>
</nlm-citation>
</ref>
<ref id="B30">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Griffin]]></surname>
<given-names><![CDATA[M. M.]]></given-names>
</name>
<name>
<surname><![CDATA[Steinbrecher]]></surname>
<given-names><![CDATA[T. D.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Large-Scale Datasets in Special Education Research]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Urbano]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
</person-group>
<source><![CDATA[International Review of Research in Developmental Disabilities]]></source>
<year>2013</year>
<page-range>155-83</page-range><publisher-loc><![CDATA[Waltham, United States ]]></publisher-loc>
<publisher-name><![CDATA[Elsevier]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B31">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Harrell]]></surname>
<given-names><![CDATA[D. F.]]></given-names>
</name>
<name>
<surname><![CDATA[Lim]]></surname>
<given-names><![CDATA[C. U.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Reimagining the avatar dream: Modeling social identity in digital media]]></article-title>
<source><![CDATA[Communications of the ACM]]></source>
<year>2017</year>
<volume>60</volume>
<numero>7</numero>
<issue>7</issue>
<page-range>50-61</page-range></nlm-citation>
</ref>
<ref id="B32">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Herrera]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Casas]]></surname>
<given-names><![CDATA[J. A.]]></given-names>
</name>
<name>
<surname><![CDATA[Romera]]></surname>
<given-names><![CDATA[E. M.]]></given-names>
</name>
<name>
<surname><![CDATA[Ortega]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[del Rey]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Validation of the European Cyberbullying Intervention Project Questionnaire for Colombian Adolescents]]></article-title>
<source><![CDATA[Cyberpsychology, Behavior, and Social Networking]]></source>
<year>2017</year>
<volume>20</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>117-25</page-range></nlm-citation>
</ref>
<ref id="B33">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hooper]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Coughlan]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Mullen]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Structural Equation Modelling: Guidelines for Determining Model Fit]]></article-title>
<source><![CDATA[Electronic Journal of Business Research Methods]]></source>
<year>2008</year>
<volume>6</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>53-60</page-range></nlm-citation>
</ref>
<ref id="B34">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hu]]></surname>
<given-names><![CDATA[L. T.]]></given-names>
</name>
<name>
<surname><![CDATA[Bentler]]></surname>
<given-names><![CDATA[P. M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Cutoff criteria for fit indexes in covariance structure analysis: Conventional criteria versus new alternatives]]></article-title>
<source><![CDATA[Structural Equation Modeling: A Multidisciplinary Journal]]></source>
<year>1999</year>
<volume>6</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>1-55</page-range></nlm-citation>
</ref>
<ref id="B35">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kelly]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Christen]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Snyder]]></surname>
<given-names><![CDATA[L. G.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[An Analysis of Effective Online Reputation Management: A Critical Thinking Social Media Activity]]></article-title>
<source><![CDATA[The Journal of Research in Business Education]]></source>
<year>2013</year>
<volume>55</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>24-35</page-range></nlm-citation>
</ref>
<ref id="B36">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kim]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Choi]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Development of Youth Digital Citizenship Scale and Implication for Educational Setting]]></article-title>
<source><![CDATA[Journal of Educational Technology &amp; Society]]></source>
<year>2018</year>
<volume>21</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>155-71</page-range></nlm-citation>
</ref>
<ref id="B37">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kline]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
</person-group>
<source><![CDATA[Principles and Practice of Structural Equation Modeling]]></source>
<year>2016</year>
<edition>4</edition>
<publisher-loc><![CDATA[New York, United States ]]></publisher-loc>
<publisher-name><![CDATA[The Guilford Press]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B38">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Lara]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[El papel de la universidad en la construcción de su identidad digital]]></article-title>
<source><![CDATA[Revista de la Universidad y Sociedad del Conocimiento]]></source>
<year>2009</year>
<volume>6</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>15-21</page-range></nlm-citation>
</ref>
<ref id="B39">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Mannerström]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Hietajärvi]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Muotka]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Salmela-Aro]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Identity profiles and digital engagement among Finnish high school students]]></article-title>
<source><![CDATA[Cyberpsychology]]></source>
<year>2018</year>
<volume>12</volume>
<numero>1</numero>
<issue>1</issue>
</nlm-citation>
</ref>
<ref id="B40">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Meraz]]></surname>
<given-names><![CDATA[A. I.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Empresa y privacidad: el cuidado de la información y los datos personales en medios digitales]]></article-title>
<source><![CDATA[Revista IUS]]></source>
<year>2018</year>
<volume>12</volume>
<numero>41</numero>
<issue>41</issue>
<page-range>293-310</page-range></nlm-citation>
</ref>
<ref id="B41">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Moreno]]></surname>
<given-names><![CDATA[B. T.]]></given-names>
</name>
<name>
<surname><![CDATA[Gajardo]]></surname>
<given-names><![CDATA[L. C.]]></given-names>
</name>
<name>
<surname><![CDATA[Parra]]></surname>
<given-names><![CDATA[O. E.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Privacidad: cómo se entiende y se gestiona en Facebook. Estudio de caso de jóvenes chilenos]]></article-title>
<source><![CDATA[Revista latina de comunicación social]]></source>
<year>2016</year>
<numero>71</numero>
<issue>71</issue>
<page-range>715-29</page-range></nlm-citation>
</ref>
<ref id="B42">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Nicholas]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[New ways of building, showcasing, and measuring scholarly reputation in the digital age]]></article-title>
<source><![CDATA[Information Services &amp; Use]]></source>
<year>2017</year>
<volume>37</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>1-5</page-range></nlm-citation>
</ref>
<ref id="B43">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Núñez]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Manolakis]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Reputación digital del alumno universitario: mucho más que tener &#8220;un millón de amigos&#8221; en Facebook]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Iriondo]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
<name>
<surname><![CDATA[Bras]]></surname>
<given-names><![CDATA[I.]]></given-names>
</name>
<name>
<surname><![CDATA[Mussi]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Gamboa]]></surname>
<given-names><![CDATA[M. C.]]></given-names>
</name>
</person-group>
<source><![CDATA[Utilizando tecnologías en la educación para fortalecer la práctica docente en América Latina. Revisiones teóricas-Experiencias prácticas]]></source>
<year>2016</year>
<page-range>334-42</page-range></nlm-citation>
</ref>
<ref id="B44">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ortega]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[del Rey]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Casas]]></surname>
<given-names><![CDATA[J. A.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Evaluar el bullying y el cyberbullying: validación española del EBIP-Q y del ECIP-Q]]></article-title>
<source><![CDATA[Psicología Educativa]]></source>
<year>2016</year>
<volume>22</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>71-9</page-range></nlm-citation>
</ref>
<ref id="B45">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Peachey]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Childs]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Virtual Worlds and Identity]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Peachey]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Childs]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<source><![CDATA[Reinventing Ourselves: Contemporary Concepts of Identity in Virtual Worlds]]></source>
<year>2011</year>
<page-range>1-12</page-range><publisher-loc><![CDATA[London, England ]]></publisher-loc>
<publisher-name><![CDATA[Springer]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B46">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Perea]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[L'identité numérique: de la cité à l'écran. Quelques aspects de la représentation de soi dans l'espace numérique]]></article-title>
<source><![CDATA[Les Enjeux de l'information et de la communication]]></source>
<year>2010</year>
<volume>2010</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>144-59</page-range></nlm-citation>
</ref>
<ref id="B47">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Pérez]]></surname>
<given-names><![CDATA[S. M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Identidad digital]]></article-title>
<source><![CDATA[Telos]]></source>
<year>2012</year>
<numero>91</numero>
<issue>91</issue>
</nlm-citation>
</ref>
<ref id="B48">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Portillo]]></surname>
<given-names><![CDATA[F. J.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Planos de realidad, identidad virtual y discurso en las redes sociales]]></article-title>
<source><![CDATA[Logos]]></source>
<year>2016</year>
<volume>26</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>51-63</page-range></nlm-citation>
</ref>
<ref id="B49">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ramos]]></surname>
<given-names><![CDATA[I.]]></given-names>
</name>
<name>
<surname><![CDATA[López]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Torrecillas]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Percepción de riesgo online en jóvenes y su efecto en el comportamiento digital]]></article-title>
<source><![CDATA[Comunicar]]></source>
<year>2018</year>
<volume>26</volume>
<numero>56</numero>
<issue>56</issue>
<page-range>71-9</page-range></nlm-citation>
</ref>
<ref id="B50">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Rodríguez]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Magdalena]]></surname>
<given-names><![CDATA[J. R.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Perspectiva de los jóvenes sobre seguridad y privacidad en las redes sociales]]></article-title>
<source><![CDATA[Icono14]]></source>
<year>2016</year>
<volume>14</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>24-49</page-range></nlm-citation>
</ref>
<ref id="B51">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Sabater]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[López]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Factores de riesgo en el ciberbullying. Frecuencia y exposición de los datos personales en Internet]]></article-title>
<source><![CDATA[International Journal of Sociology of Education]]></source>
<year>2015</year>
<volume>4</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>1-25</page-range></nlm-citation>
</ref>
<ref id="B52">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Saiz]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Ronco]]></surname>
<given-names><![CDATA[M. M.]]></given-names>
</name>
<name>
<surname><![CDATA[Echegaray]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Jóvenes, salud e Internet. Percepción, actitud y motivaciones de los jóvenes ante la información de salud]]></article-title>
<source><![CDATA[Revista Latina de Comunicación Social]]></source>
<year>2017</year>
<numero>72</numero>
<issue>72</issue>
<page-range>1317-40</page-range></nlm-citation>
</ref>
<ref id="B53">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Seker]]></surname>
<given-names><![CDATA[S. E.]]></given-names>
</name>
<name>
<surname><![CDATA[Eryarsoy]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Generating digital reputation index: A case study]]></article-title>
<source><![CDATA[Procedia-Social and Behavioral Sciences]]></source>
<year>2015</year>
<volume>195</volume>
<page-range>1074-80</page-range></nlm-citation>
</ref>
<ref id="B54">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[So]]></surname>
<given-names><![CDATA[K. K. F.]]></given-names>
</name>
<name>
<surname><![CDATA[Wu]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Xiong]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[King]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Brand Management in the Era of Social Media: Social Visibility of Consumption and Customer Brand Identification]]></article-title>
<source><![CDATA[Journal of Travel Research]]></source>
<year>2018</year>
<volume>57</volume>
<numero>6</numero>
<issue>6</issue>
<page-range>727-42</page-range></nlm-citation>
</ref>
<ref id="B55">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Telci]]></surname>
<given-names><![CDATA[E. E.]]></given-names>
</name>
<name>
<surname><![CDATA[Kantur]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[University Reputation: Scale Development and Validation]]></article-title>
<source><![CDATA[Bogazici Journal: Review of Social, Economic &amp; Administrative Studies]]></source>
<year>2014</year>
<volume>28</volume>
<numero>2</numero>
<issue>2</issue>
</nlm-citation>
</ref>
<ref id="B56">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Tusa]]></surname>
<given-names><![CDATA[J. F.]]></given-names>
</name>
</person-group>
<source><![CDATA[La construcción de la identidad digital y las narrativas híbridas]]></source>
<year>2018</year>
<publisher-loc><![CDATA[Buenos Aires ]]></publisher-loc>
<publisher-name><![CDATA[Universidad Austral]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B57">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Valderrama]]></surname>
<given-names><![CDATA[B. M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[El devenir de la identidad digital: del yo proteico al yo identificado]]></article-title>
<source><![CDATA[PAAKAT: Revista de Tecnología y Sociedad]]></source>
<year>2016</year>
<numero>11</numero>
<issue>11</issue>
</nlm-citation>
</ref>
<ref id="B58">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Van]]></surname>
<given-names><![CDATA[O. W.]]></given-names>
</name>
<name>
<surname><![CDATA[Steinfield]]></surname>
<given-names><![CDATA[C. W.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Strategic visibility in enterprise social media: Implications for network formation and boundary spanning]]></article-title>
<source><![CDATA[Journal of Management Information Systems]]></source>
<year>2018</year>
<volume>35</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>647-82</page-range></nlm-citation>
</ref>
<ref id="B59">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Vargas]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Redes sociales, literacidad e identidad (es): el caso de Facebook]]></article-title>
<source><![CDATA[Colombian Applied Linguistics Journal]]></source>
<year>2016</year>
<volume>18</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>11-23</page-range></nlm-citation>
</ref>
<ref id="B60">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Wise]]></surname>
<given-names><![CDATA[J. B.]]></given-names>
</name>
<name>
<surname><![CDATA[O&#8217;Byrne]]></surname>
<given-names><![CDATA[W. I.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Social Scholars: Educators&#8217; Digital Identity Construction in Open, Online Learning Environments]]></article-title>
<source><![CDATA[Literacy Research: Theory, Method, and Practice]]></source>
<year>2015</year>
<volume>64</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>398-414</page-range></nlm-citation>
</ref>
</ref-list>
</back>
</article>
