Outsourcing peace. Private military and security companies. A setback to security sector reform in post conflict and transition states?
To what extent does the privatisation of security effect the ongoing Security Sector Reform (SSR) in post-conflict and transition States? Are Private Contractors capable of performing security sector reform operations at all? Using J.S. Mill’s method of agreement and disagreement coupled with proces...
| Main Author: | Mehboob, Cynthia |
|---|---|
| Format: | Thesis (University of Nottingham only) |
| Language: | English |
| Published: |
2017
|
| Subjects: | |
| Online Access: | https://eprints.nottingham.ac.uk/43410/ |
Similar Items
Information Security Outsourcing with System Interdependency and Mandatory Security Requirement
by: Hui, K., et al.
Published: (2013)
by: Hui, K., et al.
Published: (2013)
Outsourcing sustainability in US expeditionary operations:
the contribution of private military and security industry in Phase IV Operations in Iraq 2003-2011
by: Jonasova, Jana
Published: (2017)
by: Jonasova, Jana
Published: (2017)
The United Nations and the maintenance of international peace and security
by: White, N.D.
Published: (1988)
by: White, N.D.
Published: (1988)
Factors critical to peacekeeping achieving stability: learning from the African Union’s peace operations
by: Cocodia, Jude
Published: (2016)
by: Cocodia, Jude
Published: (2016)
Fighting wars and enforcing laws: has the US-led ‘war on drugs’ transformed drug trafficking in Colombia and Mexico from a matter of public security to one of national security?
by: Cousins, Samuel
Published: (2019)
by: Cousins, Samuel
Published: (2019)
The influence of usable security on security culture
by: Fallatah, Wesam
Published: (2025)
by: Fallatah, Wesam
Published: (2025)
Implementing social security programmes in post-conflict Iraqi Kurdistan region: the case of "Social safety net" and "Rights and privileges to families of martyrs and genocide survivors" after 2001
by: Irwani, Muslih
Published: (2014)
by: Irwani, Muslih
Published: (2014)
Beyond the battlefield: the political economy of armed conflict and peace in Colombia
by: Dodd, Oliver
Published: (2025)
by: Dodd, Oliver
Published: (2025)
America, Brexit and the security of Europe
by: Rees, Wyn
Published: (2017)
by: Rees, Wyn
Published: (2017)
Kepelbagaian teknik cantuman untuk penghasilan pokok baharu
by: Utusan Borneo, Sarawak
Published: (2024)
by: Utusan Borneo, Sarawak
Published: (2024)
September the 11th 2001 and security dilemma.
by: Soltani, Fakhreddin, et al.
Published: (2010)
by: Soltani, Fakhreddin, et al.
Published: (2010)
Two level security approaches for secure XML database centric web services against xpath injections
by: Asmawi, Aziah
Published: (2016)
by: Asmawi, Aziah
Published: (2016)
Programming China: the Communist Party’s autonomic approach to managing state security
by: Hoffman, Samantha R.
Published: (2017)
by: Hoffman, Samantha R.
Published: (2017)
Outsourcing in the Retail Industry: From Europe to India and China
by: Agarwal, Sunil
Published: (2007)
by: Agarwal, Sunil
Published: (2007)
The Securities Industry in Malaysia: Special Reference to KLSE and the Regulatory Functions of the Securities Commission
by: Yong, Soon Ching
Published: (1997)
by: Yong, Soon Ching
Published: (1997)
A study on the factors effecting yield spread of 10 years Malaysian Government Securities / Mohd Amin Abdullah
by: Abdullah, Mohd Amin
Published: (2011)
by: Abdullah, Mohd Amin
Published: (2011)
The impact of security to Indonesian foreign policy / Adnan Nasution Seniwati
by: Adnan Nasution, Seniwati
Published: (2010)
by: Adnan Nasution, Seniwati
Published: (2010)
Peacekeeping, private security and international human rights law: a review of UN policies
by: White, Nigel D.
Published: (2014)
by: White, Nigel D.
Published: (2014)
Factors affecting the market supply value chain of apricot in Kandahar, Afghanistan
by: Hashimi, Sardar Mohammad
Published: (2020)
by: Hashimi, Sardar Mohammad
Published: (2020)
Future directions for behavioral information security research
by: Crossler, R., et al.
Published: (2013)
by: Crossler, R., et al.
Published: (2013)
Learning from history in British overseas security: case studies from intervention in the Middle East
by: Kettle, Louise
Published: (2015)
by: Kettle, Louise
Published: (2015)
A Case Analysis to Improve the
Application Maintenance and Support Outsourcing
of a National Airline
by: Chew, Alice
Published: (2009)
by: Chew, Alice
Published: (2009)
Survey on economics of information security
by: Aminnezhad, Asou, et al.
Published: (2016)
by: Aminnezhad, Asou, et al.
Published: (2016)
A tool for modeling software security requirements using security patterns
by: Maher, Zulfikar Ahmed
Published: (2016)
by: Maher, Zulfikar Ahmed
Published: (2016)
Governing the Process, Quality and Administration of Outsourced IT Project
by: Chia, Su Guan
Published: (2006)
by: Chia, Su Guan
Published: (2006)
Jordan's National Security Under King Hussein
by: Abu Shariah, Hamzeh Ismail Ibrahim
Published: (2000)
by: Abu Shariah, Hamzeh Ismail Ibrahim
Published: (2000)
A Comparative Study of IT Outsourcing Management in Australia and Taiwan
by: Lin, Chad, et al.
Published: (2007)
by: Lin, Chad, et al.
Published: (2007)
Information security policy compliance model for government agency
by: Ramli, Muhamad Amirnazmi
Published: (2018)
by: Ramli, Muhamad Amirnazmi
Published: (2018)
Selling the nuclear state: John F. Kennedy, national security and nuclear testing
by: Eastwood, Mark
Published: (2019)
by: Eastwood, Mark
Published: (2019)
A study on security of mosque / Nor Hasnida Ab Halim
by: Ab Halim, Nor Hasnida
Published: (2013)
by: Ab Halim, Nor Hasnida
Published: (2013)
Assessing the impact of peacebuilding on human security in conflict-affected states: the case of Côte d’Ivoire (2002-2015)
by: Ateku, Abdul-Jalilu
Published: (2018)
by: Ateku, Abdul-Jalilu
Published: (2018)
Evaluation Issues in Managing IS/IT Outsourcing Contracts: A Study of Large Australian Organizations
by: Lin, Chad, et al.
Published: (2005)
by: Lin, Chad, et al.
Published: (2005)
Political awareness among students / Shamsinar Rahman and Che Hamdan Che Mohd Razali
by: Rahman, Shamsinar, et al.
Published: (2019)
by: Rahman, Shamsinar, et al.
Published: (2019)
Australia's 'New Security' Challenges
by: Hubbard, Christopher
Published: (2004)
by: Hubbard, Christopher
Published: (2004)
Promotion of peace and peace education through schooling: Perspectives and experiences of girls and boys in Mauritius
by: Baligadoo, Priya Darshini
Published: (2018)
by: Baligadoo, Priya Darshini
Published: (2018)
Electronic Book of Network Security: Introduction to Network Security
by: Hoo, Cheong Yee
Published: (2003)
by: Hoo, Cheong Yee
Published: (2003)
From Telco to Techno: Outsourcing transitioning in information systems
by: Thomson, P., et al.
Published: (2006)
by: Thomson, P., et al.
Published: (2006)
Pricing Asset-backed Securities: A Revised Model
by: Bradka, Lukas
Published: (2008)
by: Bradka, Lukas
Published: (2008)
The Wealth Effect of the Securities Commission and the Central Bank Announcement
by: Yu, Kee Su
Published: (1997)
by: Yu, Kee Su
Published: (1997)
Development of Security Identification and Monitoring System for Web Application
by: Dani, Norizawati
Published: (1999)
by: Dani, Norizawati
Published: (1999)
Similar Items
-
Information Security Outsourcing with System Interdependency and Mandatory Security Requirement
by: Hui, K., et al.
Published: (2013) -
Outsourcing sustainability in US expeditionary operations:
the contribution of private military and security industry in Phase IV Operations in Iraq 2003-2011
by: Jonasova, Jana
Published: (2017) -
The United Nations and the maintenance of international peace and security
by: White, N.D.
Published: (1988) -
Factors critical to peacekeeping achieving stability: learning from the African Union’s peace operations
by: Cocodia, Jude
Published: (2016) -
Fighting wars and enforcing laws: has the US-led ‘war on drugs’ transformed drug trafficking in Colombia and Mexico from a matter of public security to one of national security?
by: Cousins, Samuel
Published: (2019)