Includes bibliographical references (p. [213]-217) and index.
Contents
Naming the threat -- Security transformations -- Trust, networks and the transformation of organizational power -- IT corporate customers as end users -- Marketing service -- Situated exclusions and reinforced power.
Reproduction
Electronic reproduction. Ann Arbor, MI : ProQuest, 2015. Available via World Wide Web. Access may be limited to ProQuest affiliated libraries.