Introduction
in Constructing cybersecurity
Abstract only
Log-in for full text

You are not authenticated to view the full text of this chapter or article.

manchesterhive requires a subscription or purchase to access the full text of books or journals - to see content that you/your institution should have access to, please log in through your library system or with your personal username and password.

If you are authenticated and think you should have access to this title, please contact your librarian.

Non-subscribers can freely search the site, view abstracts/extracts and download selected front and end matter. 

Institutions can purchase access to individual titles; please contact manchesterhive@manchester.ac.uk for pricing options.

ACCESS TOKENS

If you have an access token for this content, you can redeem this via the link below:

Redeem token

The Introduction provides the broad context for the study as well as laying out the motivations, research aims and research questions. The Introduction provides an initial justification for the decision to focus on this particular aspect of the internet security industry (developed further in Chapter 2) and also offers reflections on the method used, including which companies were studied and how the corpus was compiled. Finally, the chapter concludes with a breakdown of the book’s organisation, including what each chapter is looking to contribute to the overall objective.

Constructing cybersecurity

Power, expertise and the security industry

Metrics

All Time Past Year Past 30 Days
Abstract Views 11 11 2
Full Text Views 0 0 0
PDF Downloads 2 2 0