Monthly Archives: December 2013

Handbook for Armed Private Security Contractors in Contingency Operations

Handbook for Armed Private Security Contractors in Contingency Operations Joint Forces Command, 23 February 2010 You must be logged in to view this content. Click here to register  

Posted in Control, Shooters | Tagged , | Leave a comment

Contested stories of commercial security: self- and media narratives of private military and security companies

Critical Studies on Security Volume 1, Issue 3, 2013 Contested stories of commercial security: self- and media narratives of private military and security companies DOI: 10.1080/21624887.2013.857467 Andreas Krucka* & Alexander Spencera… You must be logged in to view this content. … Continue reading

Posted in Academic | Tagged | Leave a comment

Gender and the privatization of security: neoliberal transformation of the militarized gender order

Gender and the privatization of security: neoliberal transformation of the militarized gender order DOI: 10.1080/21624887.2013.848107 Maya Eichlera* pages 311-325 Abstract The increasing reliance on private military and security companies (PMSCs) in… You must be logged in to view this content. … Continue reading

Posted in Academic | Tagged | Leave a comment

Should Private Security Companies be Employed for Counterinsurgency Operations?

Journal of Military Ethics Volume 12, Issue 3, 2013 Should Private Security Companies be Employed for Counterinsurgency Operations? DOI: 10.1080/15027570.2013.847535 David M. Barnesa* pages 201-224 Abstract Many of the reasons offered… You must be logged in to view this content. … Continue reading

Posted in Academic | Tagged | Leave a comment

The Silenced and Indispensible GURKHAS IN PRIVATE MILITARY SECURITY COMPANIES

The Silenced and Indispensible   GURKHAS IN PRIVATE MILITARY SECURITY COMPANIES International Feminist Journal of Politics       The Silenced and Indispensible GURKHAS IN PRIVATE MILITARY SECURITY COMPANIES DOI: 10.1080/14616742.2013.781441  … You must be logged in to view this content. … Continue reading

Posted in Academic | Tagged | Leave a comment

The reorganization of legitimate violence: The contested terrain of the private military and security industry during the post-cold war era

Research in Organizational Behavior Volume 33, 2013, Pages 3–37 The reorganization of legitimate violence: The contested terrain of the private military and security industry during the post-cold war era ☆ Joel… You must be logged in to view this content. … Continue reading

Posted in Academic | Tagged | Leave a comment

The Private Security Industry Act 2001 and the security management gap in the United Kingdom

The Private Security Industry Act 2001 and the security management gap in the United Kingdom Button, Mark Security Journal24.2 (Apr 2011): 118-132. Abstract (summary) The passing of the Private Security Industry Act… You must be logged in to view this content. … Continue reading

Posted in Academic, Control, UK | Tagged , , | Leave a comment

OUTSOURCING – A POSSIBLE SOLUTION FOR IMPROVING THE PERFORMANCE OF THE LOGISTICS SYSTEMS IN THE ORGANIZATIONS

OUTSOURCING – A POSSIBLE SOLUTION FOR IMPROVING THE PERFORMANCE OF THE LOGISTICS SYSTEMS IN THE ORGANIZATIONS Badea, Dorel; Petrisor, Silviu-Mihai . Scientific Bulletin – Nicolae Balcescu Land Forces Academy15.2 (2010): 121-128. Abstract… You must be logged in to view this content. … Continue reading

Posted in Logistics, Outsourcing/Privatization | Tagged , | Leave a comment

Five Down, No Glory: Frank G. Tinker, Mercenary Ace in the Spanish Civil War

Five Down, No Glory: Frank G. Tinker, Mercenary Ace in the Spanish Civil War Ellis, Steve, USAFR. Air Power History59.3 (Fall 2012): 59-60. Abstract (summary) In 1938, Tinker published his account of… You must be logged in to view this content. … Continue reading

Posted in Mercenaries | Tagged | Leave a comment

New Actors and the State: Addressing Maritime Security Threats in Southeast Asia

New Actors and the State: Addressing Maritime Security Threats in Southeast Asia Liss, Carolin Contemporary Southeast Asia35.2 (2013): 141-162. Abstract (summary) Contemporary maritime security threats such as piracy, smuggling and illegal… You must be logged in to view this content. … Continue reading

Posted in Academic, Maritime | Tagged , | Leave a comment