Private Military and Security Companies in the United States – Evolution, Legal Regulation and Perspectives

α
Cauia Alexandr
Cauia Alexandr
σ
Zacon Corina
Zacon Corina

Send Message

To: Author

Private Military and Security Companies in the United States – Evolution, Legal Regulation and Perspectives

Article Fingerprint

ReserarchID

HMRLU

Private Military and Security Companies in the United States – Evolution, Legal Regulation and Perspectives Banner

AI TAKEAWAY

Connecting with the Eternal Ground
  • English
  • Afrikaans
  • Albanian
  • Amharic
  • Arabic
  • Armenian
  • Azerbaijani
  • Basque
  • Belarusian
  • Bengali
  • Bosnian
  • Bulgarian
  • Catalan
  • Cebuano
  • Chichewa
  • Chinese (Simplified)
  • Chinese (Traditional)
  • Corsican
  • Croatian
  • Czech
  • Danish
  • Dutch
  • Esperanto
  • Estonian
  • Filipino
  • Finnish
  • French
  • Frisian
  • Galician
  • Georgian
  • German
  • Greek
  • Gujarati
  • Haitian Creole
  • Hausa
  • Hawaiian
  • Hebrew
  • Hindi
  • Hmong
  • Hungarian
  • Icelandic
  • Igbo
  • Indonesian
  • Irish
  • Italian
  • Japanese
  • Javanese
  • Kannada
  • Kazakh
  • Khmer
  • Korean
  • Kurdish (Kurmanji)
  • Kyrgyz
  • Lao
  • Latin
  • Latvian
  • Lithuanian
  • Luxembourgish
  • Macedonian
  • Malagasy
  • Malay
  • Malayalam
  • Maltese
  • Maori
  • Marathi
  • Mongolian
  • Myanmar (Burmese)
  • Nepali
  • Norwegian
  • Pashto
  • Persian
  • Polish
  • Portuguese
  • Punjabi
  • Romanian
  • Russian
  • Samoan
  • Scots Gaelic
  • Serbian
  • Sesotho
  • Shona
  • Sindhi
  • Sinhala
  • Slovak
  • Slovenian
  • Somali
  • Spanish
  • Sundanese
  • Swahili
  • Swedish
  • Tajik
  • Tamil
  • Telugu
  • Thai
  • Turkish
  • Ukrainian
  • Urdu
  • Uzbek
  • Vietnamese
  • Welsh
  • Xhosa
  • Yiddish
  • Yoruba
  • Zulu

References

32 Cites in Article
  1. Green Paper (2002). Private Military Companies: Options for Regulation.
  2. Following the Armed Forces Outside the United States.
  3. В Федорович,О Бочкарев,В Муравник (2013). Гулиева Э.Ф. Внешняя политика Индии: отношения между Индией и США.
  4. (2000). Unknown Title.
  5. C (2005). Drugs control.
  6. Mark Bromley (2000). Arms Transfers and Export-Control Policies.
  7. М Небольсина,А Никитин (2016). Перспективы международного регулирования деятельности частных военных компаний. В: Вестник Университета.
  8. Dwight Eisenhower (1961). Farewell Address to the Nation, January 17, 1961.
  9. J Elsea (2005). Treatment of Prisoners in Iraq: Selected Legal Issues.
  10. Green Paper (2002). Private Military Companies: Options for Regulation.
  11. T Garmon (2003). USA: Alien Tort Claims Act, 1789.
  12. Kendra Cook (2005). The ITAR and you - what you need to know about the International Traffic in Arms Regulations.
  13. W Jennings (1959). The Law and the Constitution.
  14. K Jennings (2006). Armed Services: Regulating the Private Military Industry.
  15. Jsg Blair (2007). Dr John Snow.
  16. (2003). Authorization Bills.
  17. Mark Yost,Douglas Anderson (2000). The Military Extraterritorial Jurisdiction Act of 2000: Closing the Gap.
  18. Emad Al Khoufi (2021). Adu, K.K. and Adjei, E. (2018). The phenomenon of data loss and cyber security issues in Ghana. Foresight, 20(2), 150–61. Ahmed, M.T.U., Bhuiya, N.I. and Rahman, M.M. (2017). A secure enterprise architecture focused on security and technology-transformation (SEAST), The 12th International Conference for Internet Technology and Secured Transactions, (ICITST-2017), Cambridge, UK, 11–4/12/2017. Alanazi, S.T., Anbar, M., Ebad, S.A., Karuppayah, S. and Al-Ani, H.A. (2020). Theory-based model and prediction analysis of information security compliance behavior in the Saudi healthcare sector. Symmetry, 12(9), 1544. DOI: 10.3390/sym12091544 Alateyah, S.A., Crowder, R.M. and Wills, G.B. (2013). Identified factors affecting the citizen’s intention to adopt e-government in Saudi Arabia. World Academy of Science, Engineering and Technology, 7(8), 904–12. Antonino, P., Duszynski, S., Jung, C. and Rudolph, M. (2010). Indicator-based architecture-level security evaluation in a service-oriented environment. In: The Fourth European Conference on Software Architecture: Copenhagen, Denmark, 23–26/08/2010. DOI: 10.1145/1842752.1842795. Chaturvedi, M., Gupta, M. and Bhattacharya, J. (2008). Cyber Security Infrastructure in India: A Study, Emerging Technologies in E-Government. Available at: http://www.csi-sigegov.org/emerging_pdf/9_70-84.pdf (Accessed on 15/11/2020). Dalol, M.H. (2018). Effectiveness of Accounting Information Systems in Light of Development of IT Infrastructure and Information Security. Master’s Dissertation, The Islamic University of Gaza, Gaza, Palestine. Dooley, K. (2001). Designing Large Scale LANs: Help for Network Designers. USA: O'Reilly Media. Ebad, S. (2018a) An exploratory study of ICT projects failure in emerging markets. Journal of Global Information Technology Management, 21(2), 139–60. DOI: 10.1080/1097198X.2018.1462071. Ebad, S. (2018b). The influencing causes of software unavailability: A case study from industry. Software Practice and Experience, 48(5), 1056–76. DOI: 10.1002/spe.2569. Hashizume, K., Rosado, D.G., Fernández-Medina, E. and Fernandez, E.B. (2013). An analysis of security issues for cloud computing. Journal of Internet Services and Applications, 4(5), n/a. DOI: 10.1186/1869-0238-4-5. Kirby, L. (2015). Beyond Cyber Security: Protecting Your IT Infrastructure. Available at https://uptimeinstitute.com/images/Documents/ProtectingYourITInfrastructure.pdf (accessed on 15/11/2020). Lethbridge, T.C., Sim, S.E. and Singer, J. (2005). Studying software engineers: Data collection techniques for software field studies. Empirical Software Engineering, 10(3), 311–41. Marrone, M. and Kolbe, L.M. (2011). Impact of IT service management frameworks on the IT organization. Business and Information Systems Engineering, 3(1), 5–18. Mastelic, T. and Brandic, I. (2013). TimeCap: Methodology for comparing IT infrastructures based on time and capacity metrics. In: The IEEE 6th International Conference on Cloud Computing, 131–8, Santa Clara, CA, USA, 28/06–03/07/2013. Mimura, M. and Suga, Y. (2019). Filtering malicious JavaScript code with Doc2Vec on an imbalanced dataset. In: The 14th Asia Joint Conference on Information Security (AsiaJCIS), Kobe, Japan, 24–31/08/2019. Pearlson, K.E., Saunders, C.S. and Galletta, D.F. (2019). Managing and Using Information Systems. 5th edition, USA: Wiley. Popp, K. and Meyer, R. (2011). Profit from Software Ecosystems Models, Ecosystems and Partnerships in the Software Industry. Norderstedt, Germany: Books on Demand. Priem, R. (2020). Distributed ledger technology for securities clearing and settlement: Benefits, risks, and regulatory implications. Financial Innovation, 6(11), n/a. DOI: 10.1186/s40854-019-0169-6. Rabii, L. and Abdelaziz, D. (2015). Comparison of e-readiness composite indicators, The 15th International Conference on Intelligent Systems Design and Applications (ISDA), Marrakech, Morocco, 14–16/12/2015. Sanchez-Nielsen, E., Padron-Ferrer, A. and Marreo-Estevez, F. (2011). A multi-agent system for incident management solutions on IT infrastructures. In: The 14th Conference of the Spanish Association for Artificial Intelligence (CAEPIA 2011), La Laguna, Spain, 07–11/11/2011. Schoenfisch, J, Meilicke, C., Stülpnagel, J.V. and Ortmann, J (2018). Root cause analysis in IT infrastructures using ontologies and abduction in Markov logic networks. Information Systems, 74(2), 103–16. Shang, S. and Seddon, P.B. (2000). A comprehensive framework for classifying the benefits of ERP systems. In: The 2000 American Conference of Information Systems, Long Beach, California, 10–13/08/2000. Shoffner, M., Owen, P., Mostafa, J., Lamm, B., Wang, X., Schmitt, C.P. and Ahalt S.C. (2013). The secure medical research workspace: An IT infrastructure to enable secure research on clinical data. Clinical and Translational Science, 6 (3), 222–5. Shrivastava, A.K. (2015). The impact assessment of IT Infrastructure on information security: a survey report. In: International Conference on Information Security and Privacy (ICISP2015), Nagpur, India, 11–12/12/2015. Sommerville, I. (2015). Software Engineering. 10th edition, UK: Pearson. Sousa, K.J. and Oz, E. (2015). Management Information Systems. 7th edition, USA: Cengage Learning. Teymourlouei, H., and Harris, V. (2019). Effective methods to monitor IT infrastructure security for small business. In: The 2019 International Conference on Computational Science and Computational Intelligence (CSCI), Las Vegas, NV, USA, 5–7/12/2019. Topper, J. (2018). Compliance is not security. Computer Fraud and Security, 2018(3), 5–8. DOI: 10.1016/S1361-3723(18)30022-8. Wohlin, C., Runeson, P., Host, M., Ohlsson, M.C., Regnell, B. and Wesslen, A. (2012). Experimentation in Software Engineering. Germany: Springer. Yasasin, E., Prester, J., Wagner, G. and Schryen, G. (2020). Forecasting IT security vulnerabilities –an empirical analysis. Computers and Security, 88(n/a), n/a. DOI: 10.1016/j.cose.2019.101610. Zambon, E., Etalle, S., Wieringa, R.J. and Hartel, P. (2010). Model-based qualitative risk assessment for availability of IT infrastructures. Software and Systems Modeling, 10(4), 553–80..
  19. (1998). Unknown Title.
  20. Ronald (2004). Reagan National Defense Authorization Act for Fiscal Year.
  21. A Sebok (2004). Assessing Possible Tort Claims by Iraqi Prisoners.
  22. P Singer (2008). Corpоrate Warriors: The Rise of the Privatized Military Industry.
  23. Samuel Cheuvront (2003). The zone diet phenomenon: A closer look at the science behind the claims.
  24. Samuel Worthington (2020). 5. Sharing the Same Space: The Evolving Relationship between US NGOs, Battlefield Contractors, and US Armed Forces.
  25. Bradley Pyburn (2009). Application of US Special Operations Command Model to Department of Defense Cyberspace Force.
  26. Following the Armed Forces Outside the United States.
  27. Extending the Unified Code of Military Justice jurisdiction to contractors hired by the US Department of Defense.
  28. Court Us Supreme,V Sosa,Alvarez-Machian (2004). Supreme Court Cases: 2002-2003 Term.
  29. А Волеводз (2015). Саврыга К.П. Международная уголовная ответственность сотрудников частных военных и охранных компаний..
  30. Юстиция (2009). Unknown Title.
  31. М Небольсина,А Никитин (2016). Перспективы международного регулирования деятельности частных военных компаний. В: Вестник Университета.
  32. В Федорович,О Бочкарев,В Муравник (2013). Гулиева Э.Ф. Внешняя политика Индии: отношения между Индией и США.

Funding

No external funding was declared for this work.

Conflict of Interest

The authors declare no conflict of interest.

Ethical Approval

No ethics committee approval was required for this article type.

Data Availability

Not applicable for this article.

How to Cite This Article

Cauia Alexandr. 2022. \u201cPrivate Military and Security Companies in the United States – Evolution, Legal Regulation and Perspectives\u201d. Global Journal of Human-Social Science - A: Arts & Humanities GJHSS-A Volume 21 (GJHSS Volume 21 Issue A15): .

Download Citation

Alt: Analysis of military and security companies' regulatory and compliance aspects in the US.
Journal Specifications

Crossref Journal DOI 10.17406/GJHSS

Print ISSN 0975-587X

e-ISSN 2249-460X

Keywords
Classification
GJHSS-A Classification: FOR Code: 390404
Version of record

v1.2

Issue date

January 18, 2022

Language
en
Experiance in AR

Explore published articles in an immersive Augmented Reality environment. Our platform converts research papers into interactive 3D books, allowing readers to view and interact with content using AR and VR compatible devices.

Read in 3D

Your published article is automatically converted into a realistic 3D book. Flip through pages and read research papers in a more engaging and interactive format.

Article Matrices
Total Views: 2019
Total Downloads: 851
2026 Trends
Related Research

Published Article

Abstract not found

Our website is actively being updated, and changes may occur frequently. Please clear your browser cache if needed. For feedback or error reporting, please email [email protected]

Request Access

Please fill out the form below to request access to this research paper. Your request will be reviewed by the editorial or author team.
X

Quote and Order Details

Contact Person

Invoice Address

Notes or Comments

This is the heading

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

High-quality academic research articles on global topics and journals.

Private Military and Security Companies in the United States – Evolution, Legal Regulation and Perspectives

Cauia Alexandr
Cauia Alexandr
Zacon Corina
Zacon Corina

Research Journals