Re-Configuring Security Practices


Union Jack

Re-Configuring Security Practices

Show simple item record Leander, Anna en_US 2009-02-04T10:25:35Z 2009-02-04T10:25:35Z 2007-05-16T00:00:00Z en_US
dc.format.extent 16 s. en_US
dc.language eng en_US
dc.relation.ispartofseries Working paper;2007-088 en_US
dc.title Re-Configuring Security Practices en_US
dc.type wp en_US
dc.accessionstatus modt07maj16 gepomo en_US
dc.contributor.corporation Copenhagen Business School. CBS en_US
dc.contributor.department Institut for Interkulturel Kommunikation og Ledelse en_US
dc.contributor.departmentshort IKL en_US
dc.contributor.departmentuk Department of Intercultural Communication and Management en_US
dc.contributor.departmentukshort IKL en_US
dc.description.notes Versions of this paper has been presented at the Central European University (18 January 2006), the CEEISA meeting in Tartu (26 June 2006), and at the Wittenberg workshop from which this paper stems en_US
dc.idnumber x656546009 en_US København en_US
dc.publisher.year 2007 en_US
dc.title.subtitle The Power of the Private Security Business en_US

Creative Commons License This work is licensed under a Creative Commons License.

Files Size Format View
reconfiguring security praxis-wp88.pdf 110.5Kb PDF View/Open

This item appears in the following Collection(s)

Show simple item record