Technological turf wars : a case study of the computer antivirus industry / / Jessica Johnston.

Saved in:
Bibliographic Details
:
TeilnehmendeR:
Year of Publication:2009
Language:English
Online Access:
Physical Description:222 p. ;; 21 cm.
Tags: Add Tag
No Tags, Be the first to tag this record!
id 500432873
ctrlnum (MiAaPQ)500432873
(Au-PeEL)EBL432873
(CaPaEBR)ebr10279967
(CaONFJC)MIL204736
(OCoLC)317147295
collection bib_alma
record_format marc
spelling Johnston, Jessica R., 1952-
Technological turf wars [electronic resource] : a case study of the computer antivirus industry / Jessica Johnston.
Philadelphia : Temple University Press, 2009.
222 p. ; 21 cm.
Includes bibliographical references (p. [213]-217) and index.
Naming the threat -- Security transformations -- Trust, networks and the transformation of organizational power -- IT corporate customers as end users -- Marketing service -- Situated exclusions and reinforced power.
Electronic reproduction. Ann Arbor, MI : ProQuest, 2015. Available via World Wide Web. Access may be limited to ProQuest affiliated libraries.
Computer software industry Social aspects United States Case studies.
Computer software industry Moral and ethical aspects United States Case studies.
Computer security Social aspects United States Case studies.
Computer security Moral and ethical aspects United States Case studies.
Organizational behavior United States Case studies.
Business ethics United States Case studies.
Electronic books.
ProQuest (Firm)
https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=432873 Click to View
language English
format Electronic
eBook
author Johnston, Jessica R., 1952-
spellingShingle Johnston, Jessica R., 1952-
Technological turf wars a case study of the computer antivirus industry /
Naming the threat -- Security transformations -- Trust, networks and the transformation of organizational power -- IT corporate customers as end users -- Marketing service -- Situated exclusions and reinforced power.
author_facet Johnston, Jessica R., 1952-
ProQuest (Firm)
ProQuest (Firm)
author_variant j r j jr jrj
author2 ProQuest (Firm)
author2_role TeilnehmendeR
author_corporate ProQuest (Firm)
author_sort Johnston, Jessica R., 1952-
title Technological turf wars a case study of the computer antivirus industry /
title_sub a case study of the computer antivirus industry /
title_full Technological turf wars [electronic resource] : a case study of the computer antivirus industry / Jessica Johnston.
title_fullStr Technological turf wars [electronic resource] : a case study of the computer antivirus industry / Jessica Johnston.
title_full_unstemmed Technological turf wars [electronic resource] : a case study of the computer antivirus industry / Jessica Johnston.
title_auth Technological turf wars a case study of the computer antivirus industry /
title_new Technological turf wars
title_sort technological turf wars a case study of the computer antivirus industry /
publisher Temple University Press,
publishDate 2009
physical 222 p. ; 21 cm.
contents Naming the threat -- Security transformations -- Trust, networks and the transformation of organizational power -- IT corporate customers as end users -- Marketing service -- Situated exclusions and reinforced power.
callnumber-first Q - Science
callnumber-subject QA - Mathematics
callnumber-label QA76
callnumber-sort QA 276.9 A25 J57 42009
genre Electronic books.
genre_facet Case studies.
Electronic books.
geographic_facet United States
url https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=432873
illustrated Not Illustrated
dewey-hundreds 000 - Computer science, information & general works
dewey-tens 000 - Computer science, knowledge & systems
dewey-ones 005 - Computer programming, programs & data
dewey-full 005.8
dewey-sort 15.8
dewey-raw 005.8
dewey-search 005.8
oclc_num 317147295
work_keys_str_mv AT johnstonjessicar technologicalturfwarsacasestudyofthecomputerantivirusindustry
AT proquestfirm technologicalturfwarsacasestudyofthecomputerantivirusindustry
status_str n
ids_txt_mv (MiAaPQ)500432873
(Au-PeEL)EBL432873
(CaPaEBR)ebr10279967
(CaONFJC)MIL204736
(OCoLC)317147295
is_hierarchy_title Technological turf wars a case study of the computer antivirus industry /
author2_original_writing_str_mv noLinkedField
_version_ 1792330690172289025
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02140nam a2200457 a 4500</leader><controlfield tag="001">500432873</controlfield><controlfield tag="003">MiAaPQ</controlfield><controlfield tag="005">20200520144314.0</controlfield><controlfield tag="006">m o d | </controlfield><controlfield tag="007">cr cn|||||||||</controlfield><controlfield tag="008">080318s2009 pau sb 001 0 eng </controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="z"> 2008012514</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781592138814 (cloth : alk. paper)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">1592138810 (cloth : alk. paper)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781592138821 (pbk. : alk. paper)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">1592138829 (pbk. : alk. paper)</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(MiAaPQ)500432873</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(Au-PeEL)EBL432873</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CaPaEBR)ebr10279967</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CaONFJC)MIL204736</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)317147295</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">MiAaPQ</subfield><subfield code="c">MiAaPQ</subfield><subfield code="d">MiAaPQ</subfield></datafield><datafield tag="043" ind1=" " ind2=" "><subfield code="a">n-us---</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.9.A25</subfield><subfield code="b">J57 2009</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Johnston, Jessica R.,</subfield><subfield code="d">1952-</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Technological turf wars</subfield><subfield code="h">[electronic resource] :</subfield><subfield code="b">a case study of the computer antivirus industry /</subfield><subfield code="c">Jessica Johnston.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Philadelphia :</subfield><subfield code="b">Temple University Press,</subfield><subfield code="c">2009.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">222 p. ;</subfield><subfield code="c">21 cm.</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references (p. [213]-217) and index.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Naming the threat -- Security transformations -- Trust, networks and the transformation of organizational power -- IT corporate customers as end users -- Marketing service -- Situated exclusions and reinforced power.</subfield></datafield><datafield tag="533" ind1=" " ind2=" "><subfield code="a">Electronic reproduction. Ann Arbor, MI : ProQuest, 2015. Available via World Wide Web. Access may be limited to ProQuest affiliated libraries.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer software industry</subfield><subfield code="x">Social aspects</subfield><subfield code="z">United States</subfield><subfield code="v">Case studies.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer software industry</subfield><subfield code="x">Moral and ethical aspects</subfield><subfield code="z">United States</subfield><subfield code="v">Case studies.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield><subfield code="x">Social aspects</subfield><subfield code="z">United States</subfield><subfield code="v">Case studies.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield><subfield code="x">Moral and ethical aspects</subfield><subfield code="z">United States</subfield><subfield code="v">Case studies.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Organizational behavior</subfield><subfield code="z">United States</subfield><subfield code="v">Case studies.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Business ethics</subfield><subfield code="z">United States</subfield><subfield code="v">Case studies.</subfield></datafield><datafield tag="655" ind1=" " ind2="4"><subfield code="a">Electronic books.</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">ProQuest (Firm)</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=432873</subfield><subfield code="z">Click to View</subfield></datafield></record></collection>