Re-Configuring Security Practices

OPEN ARCHIVE

Union Jack
Dannebrog

Re-Configuring Security Practices

Show simple item record

dc.contributor.author Leander, Anna en_US
dc.date.accessioned 2009-02-04T10:25:35Z
dc.date.available 2009-02-04T10:25:35Z
dc.date.issued 2007-05-16T00:00:00Z en_US
dc.identifier.uri http://hdl.handle.net/10398/6948
dc.format.extent 16 s. en_US
dc.language eng en_US
dc.relation.ispartofseries Working paper;2007-088 en_US
dc.title Re-Configuring Security Practices en_US
dc.type wp en_US
dc.accessionstatus modt07maj16 gepomo en_US
dc.contributor.corporation Copenhagen Business School. CBS en_US
dc.contributor.department Institut for Interkulturel Kommunikation og Ledelse en_US
dc.contributor.departmentshort IKL en_US
dc.contributor.departmentuk Department of Intercultural Communication and Management en_US
dc.contributor.departmentukshort IKL en_US
dc.description.notes Versions of this paper has been presented at the Central European University (18 January 2006), the CEEISA meeting in Tartu (26 June 2006), and at the Wittenberg workshop from which this paper stems en_US
dc.idnumber x656546009 en_US
dc.publisher.city København en_US
dc.publisher.year 2007 en_US
dc.title.subtitle The Power of the Private Security Business en_US


Creative Commons License This work is licensed under a Creative Commons License.

Files Size Format View
reconfiguring security praxis-wp88.pdf 110.5Kb PDF View/Open

This item appears in the following Collection(s)

Show simple item record