Description

Book Synopsis
Exploring computer security as both a social and technical problem

Trade Review
"Johnston presents the ways antivirus workers think in fascinating detail. She is very astute and effective in analyzing and explicating the underlying assumptions of their logic. Technological Turf Wars is insightful, interesting, and it unfolds in ways that are quite surprising. Johnston demonstrates that this industry is as much a social world as it is a technical world."
John L. Caughey, Professor of American Studies, University of Maryland, College Park

Table of Contents

Acknowledgements
Introduction
1. Naming the Threat
2. Security Transformations
3. Trust, Networks, and the Transformation of Organizational Power
4. IT Corporate Customers as End Users
5. Marketing Services
6. Situated Exclusions and Reinforced Power
Works Cited
Index

Technological Turf Wars: A Case Study of the

Product form

£23.74

Includes FREE delivery

RRP £24.99 – you save £1.25 (5%)

Order before 4pm tomorrow for delivery by Mon 5 Jan 2026.

A Paperback / softback by Jessica R. Johnston

10 in stock


    View other formats and editions of Technological Turf Wars: A Case Study of the by Jessica R. Johnston

    Publisher: Temple University Press,U.S.
    Publication Date: 15/11/2008
    ISBN13: 9781592138821, 978-1592138821
    ISBN10: 1592138829

    Description

    Book Synopsis
    Exploring computer security as both a social and technical problem

    Trade Review
    "Johnston presents the ways antivirus workers think in fascinating detail. She is very astute and effective in analyzing and explicating the underlying assumptions of their logic. Technological Turf Wars is insightful, interesting, and it unfolds in ways that are quite surprising. Johnston demonstrates that this industry is as much a social world as it is a technical world."
    John L. Caughey, Professor of American Studies, University of Maryland, College Park

    Table of Contents

    Acknowledgements
    Introduction
    1. Naming the Threat
    2. Security Transformations
    3. Trust, Networks, and the Transformation of Organizational Power
    4. IT Corporate Customers as End Users
    5. Marketing Services
    6. Situated Exclusions and Reinforced Power
    Works Cited
    Index

    Recently viewed products

    © 2025 Book Curl

      • American Express
      • Apple Pay
      • Diners Club
      • Discover
      • Google Pay
      • Maestro
      • Mastercard
      • PayPal
      • Shop Pay
      • Union Pay
      • Visa

      Login

      Forgot your password?

      Don't have an account yet?
      Create account