Reviews
Description
For governments and businesses, social movements, criminal organizations and terrorists alike, Information technology has become central to the way groups organize themselves and pursue global objectives. With the emergence of the Internet and new digital technologies - and particularly in the post-9/11 era of homeland security - the relationship between IT and security has found a new and pressing relevance. Here, a collection of scholars explores the ways IT has made traditional boundaries increasingly irrelevant, challenging traditional concepts of privacy, surveillance, vulnerability and above all, security.
EXTRA 10 % discount with code: EXTRA
The promotion ends in 21d.06:16:27
The discount code is valid when purchasing from 10 €. Discounts do not stack.
For governments and businesses, social movements, criminal organizations and terrorists alike, Information technology has become central to the way groups organize themselves and pursue global objectives. With the emergence of the Internet and new digital technologies - and particularly in the post-9/11 era of homeland security - the relationship between IT and security has found a new and pressing relevance. Here, a collection of scholars explores the ways IT has made traditional boundaries increasingly irrelevant, challenging traditional concepts of privacy, surveillance, vulnerability and above all, security.
Reviews