Loading…
Table of Contents:
  • Naming the threat
  • Security transformations
  • Trust, networks and the transformation of organizational power
  • IT corporate customers as end users
  • Marketing service
  • Situated exclusions and reinforced power.