Technological turf wars : a case study of the computer antivirus industry / / Jessica Johnston.
Saved in:
: | |
---|---|
TeilnehmendeR: | |
Year of Publication: | 2009 |
Language: | English |
Online Access: | |
Physical Description: | 222 p. ;; 21 cm. |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
500432873 |
---|---|
ctrlnum |
(MiAaPQ)500432873 (Au-PeEL)EBL432873 (CaPaEBR)ebr10279967 (CaONFJC)MIL204736 (OCoLC)317147295 |
collection |
bib_alma |
record_format |
marc |
spelling |
Johnston, Jessica R., 1952- Technological turf wars [electronic resource] : a case study of the computer antivirus industry / Jessica Johnston. Philadelphia : Temple University Press, 2009. 222 p. ; 21 cm. Includes bibliographical references (p. [213]-217) and index. Naming the threat -- Security transformations -- Trust, networks and the transformation of organizational power -- IT corporate customers as end users -- Marketing service -- Situated exclusions and reinforced power. Electronic reproduction. Ann Arbor, MI : ProQuest, 2015. Available via World Wide Web. Access may be limited to ProQuest affiliated libraries. Computer software industry Social aspects United States Case studies. Computer software industry Moral and ethical aspects United States Case studies. Computer security Social aspects United States Case studies. Computer security Moral and ethical aspects United States Case studies. Organizational behavior United States Case studies. Business ethics United States Case studies. Electronic books. ProQuest (Firm) https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=432873 Click to View |
language |
English |
format |
Electronic eBook |
author |
Johnston, Jessica R., 1952- |
spellingShingle |
Johnston, Jessica R., 1952- Technological turf wars a case study of the computer antivirus industry / Naming the threat -- Security transformations -- Trust, networks and the transformation of organizational power -- IT corporate customers as end users -- Marketing service -- Situated exclusions and reinforced power. |
author_facet |
Johnston, Jessica R., 1952- ProQuest (Firm) ProQuest (Firm) |
author_variant |
j r j jr jrj |
author2 |
ProQuest (Firm) |
author2_role |
TeilnehmendeR |
author_corporate |
ProQuest (Firm) |
author_sort |
Johnston, Jessica R., 1952- |
title |
Technological turf wars a case study of the computer antivirus industry / |
title_sub |
a case study of the computer antivirus industry / |
title_full |
Technological turf wars [electronic resource] : a case study of the computer antivirus industry / Jessica Johnston. |
title_fullStr |
Technological turf wars [electronic resource] : a case study of the computer antivirus industry / Jessica Johnston. |
title_full_unstemmed |
Technological turf wars [electronic resource] : a case study of the computer antivirus industry / Jessica Johnston. |
title_auth |
Technological turf wars a case study of the computer antivirus industry / |
title_new |
Technological turf wars |
title_sort |
technological turf wars a case study of the computer antivirus industry / |
publisher |
Temple University Press, |
publishDate |
2009 |
physical |
222 p. ; 21 cm. |
contents |
Naming the threat -- Security transformations -- Trust, networks and the transformation of organizational power -- IT corporate customers as end users -- Marketing service -- Situated exclusions and reinforced power. |
callnumber-first |
Q - Science |
callnumber-subject |
QA - Mathematics |
callnumber-label |
QA76 |
callnumber-sort |
QA 276.9 A25 J57 42009 |
genre |
Electronic books. |
genre_facet |
Case studies. Electronic books. |
geographic_facet |
United States |
url |
https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=432873 |
illustrated |
Not Illustrated |
dewey-hundreds |
000 - Computer science, information & general works |
dewey-tens |
000 - Computer science, knowledge & systems |
dewey-ones |
005 - Computer programming, programs & data |
dewey-full |
005.8 |
dewey-sort |
15.8 |
dewey-raw |
005.8 |
dewey-search |
005.8 |
oclc_num |
317147295 |
work_keys_str_mv |
AT johnstonjessicar technologicalturfwarsacasestudyofthecomputerantivirusindustry AT proquestfirm technologicalturfwarsacasestudyofthecomputerantivirusindustry |
status_str |
n |
ids_txt_mv |
(MiAaPQ)500432873 (Au-PeEL)EBL432873 (CaPaEBR)ebr10279967 (CaONFJC)MIL204736 (OCoLC)317147295 |
is_hierarchy_title |
Technological turf wars a case study of the computer antivirus industry / |
author2_original_writing_str_mv |
noLinkedField |
_version_ |
1792330690172289025 |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02140nam a2200457 a 4500</leader><controlfield tag="001">500432873</controlfield><controlfield tag="003">MiAaPQ</controlfield><controlfield tag="005">20200520144314.0</controlfield><controlfield tag="006">m o d | </controlfield><controlfield tag="007">cr cn|||||||||</controlfield><controlfield tag="008">080318s2009 pau sb 001 0 eng </controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="z"> 2008012514</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781592138814 (cloth : alk. paper)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">1592138810 (cloth : alk. paper)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781592138821 (pbk. : alk. paper)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">1592138829 (pbk. : alk. paper)</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(MiAaPQ)500432873</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(Au-PeEL)EBL432873</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CaPaEBR)ebr10279967</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CaONFJC)MIL204736</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)317147295</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">MiAaPQ</subfield><subfield code="c">MiAaPQ</subfield><subfield code="d">MiAaPQ</subfield></datafield><datafield tag="043" ind1=" " ind2=" "><subfield code="a">n-us---</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.9.A25</subfield><subfield code="b">J57 2009</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Johnston, Jessica R.,</subfield><subfield code="d">1952-</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Technological turf wars</subfield><subfield code="h">[electronic resource] :</subfield><subfield code="b">a case study of the computer antivirus industry /</subfield><subfield code="c">Jessica Johnston.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Philadelphia :</subfield><subfield code="b">Temple University Press,</subfield><subfield code="c">2009.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">222 p. ;</subfield><subfield code="c">21 cm.</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references (p. [213]-217) and index.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Naming the threat -- Security transformations -- Trust, networks and the transformation of organizational power -- IT corporate customers as end users -- Marketing service -- Situated exclusions and reinforced power.</subfield></datafield><datafield tag="533" ind1=" " ind2=" "><subfield code="a">Electronic reproduction. Ann Arbor, MI : ProQuest, 2015. Available via World Wide Web. Access may be limited to ProQuest affiliated libraries.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer software industry</subfield><subfield code="x">Social aspects</subfield><subfield code="z">United States</subfield><subfield code="v">Case studies.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer software industry</subfield><subfield code="x">Moral and ethical aspects</subfield><subfield code="z">United States</subfield><subfield code="v">Case studies.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield><subfield code="x">Social aspects</subfield><subfield code="z">United States</subfield><subfield code="v">Case studies.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield><subfield code="x">Moral and ethical aspects</subfield><subfield code="z">United States</subfield><subfield code="v">Case studies.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Organizational behavior</subfield><subfield code="z">United States</subfield><subfield code="v">Case studies.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Business ethics</subfield><subfield code="z">United States</subfield><subfield code="v">Case studies.</subfield></datafield><datafield tag="655" ind1=" " ind2="4"><subfield code="a">Electronic books.</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">ProQuest (Firm)</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=432873</subfield><subfield code="z">Click to View</subfield></datafield></record></collection> |