Linked e-resources

Details

Naming the threat
Security transformations
Trust, networks and the transformation of organizational power
IT corporate customers as end users
Marketing service
Situated exclusions and reinforced power.

Browse Subjects

Show more subjects...

Statistics

from
to
Export