Includes bibliographical references (p. [213]-217) and index.
CONTENTS NOTE
Text of Note
Naming the threat -- Security transformations -- Trust, networks and the transformation of organizational power -- IT corporate customers as end users -- Marketing service -- Situated exclusions and reinforced power.
0
TOPICAL NAME USED AS SUBJECT
Business ethics-- United States, Case studies.
Computer security-- Moral and ethical aspects-- United States, Case studies.
Computer security-- Social aspects-- United States, Case studies.
Computer software industry-- Moral and ethical aspects-- United States, Case studies.
Computer software industry-- Social aspects-- United States, Case studies.
Organizational behavior-- United States, Case studies.