Includes bibliographical references (p. -217) and index.
Naming the threat -- Security transformations -- Trust, networks and the transformation of organizational power -- IT corporate customers as end users -- Marketing service -- Situated exclusions and reinforced power.
Electronic reproduction. Ann Arbor, MI : ProQuest, 2015. Available via World Wide Web. Access may be limited to ProQuest affiliated libraries.