Just war theory and private security companies - Wiley Online Library

Just war theory has traditionally been divided into two sets of principles.8 The jus ad bellum principles—the requirement that wars be initiated only in pursuit of.

Just war theory and private security companies - Wiley Online Library - Related Documents

Just war theory and private security companies - Wiley Online Library

Just war theory has traditionally been divided into two sets of principles.8 The jus ad bellum principles—the requirement that wars be initiated only in pursuit of.

Introduction to Private Equity - Wiley Online Library

components of the private equity market, leveraged buy-out (LBO) and private ... After seven years of lobbying Christopher Columbus convinced the Spanish ... 8 This is an early illustration of a phenomenon which would become ... In most European countries, as well as in the US, venture capital is synonymous with life.

Private equity in Africa: Lessons learned - Wiley Online Library

Private Equity in Africa: Lessons Learned. Correspondence to: Carolyn Campbell, Managing Director and General Counsel, Emerging Capital Partners, 1602 L ...

On the IEEE 802.11i security - Wiley Online Library

21 Aug 2014 ... The IEEE 802.11i standard provides authentication and security at the Medium Access Control layer in ... Wireless local area network (WLAN) technology use, utility ... information including the MAC address of the associated.

The Novel (in Theory) - Wiley Online Library

Literature Compass 6/1 (2009): 228–243, 10.1111/j.1741-4113.2008.00590.x. The Novel (in Theory). David Kurnick*. Rutgers University. Abstract. In a moment ...

Theory and reality - Wiley Online Library

9 Aug 2004 ... Theory and Reality, by Peter Godfrey-Smith, 2003. The University of Chicago Press,. Chicago. xiii 272 pp. ISBN 0-226-30063-3.

Elite Theory - Wiley Online Library

However, since the early twentieth century elite theory has appeared in a number of forms, some of which draw on ideas from Marxist and pluralist theories of ...

Contingency Theory - Wiley Online Library

Classical management theories with mechanistic approaches postulated that there is one best way to organize, as opposed to the contingency approach that ...

Anomie Theory - Wiley Online Library

Three main anomie theories in criminology are Emile Durkheim's moral anomie, Robert K. Merton's social structure and anomie, and the institutional anomie ...

Continuity Theory - Wiley Online Library

Continuity theory research builds on the groundwork of a stimulus or condi- tioned response. Past learning sets organisms' behaviors for the indefinite future.

THE PROLIFERATION OF PRIVATE SECURITY COMPANIES ...

https://hubpages.com/business/The-History-of-Private-Security). This established practice continued and evolved in ancient Rome, where the wealthy hired private.

Distinctive Feature Theory - Wiley Online Library

The term 'distinctive features' is used in phonology to refer to the minimal units of sound that serve to distinguish the meaning of one word from another within a ...

Basics of Accounting Theory - Wiley Online Library

Basic assumptions def ne the basic objectives of accounting practice. ... The periodicity assumption refers to the qualitative characteristic of timeliness. The.

Social Judgment Theory - Wiley Online Library

Social judgment theory (SJT; Sherif & Hovland 1961; Sherif et al. 1965) is based on the premise that the effect of a persuasive message on a particular issue ...

Routine Activities Theory - Wiley Online Library

Unlike theories that focus on the individual char- acteristics of criminal offenders, routine activities theory examines the environmental context in which crimes ...

Routine Activity Theory - Wiley Online Library

Routine activity theory, first formulated by. Lawrence E. Cohen and Marcus Felson (1979) and later developed by Felson, is one of the most widely cited and ...

Muted Group Theory - Wiley Online Library

Muted group theory addresses the ways in which the discourse of dominant groups is centered in society, while the perspectives and experiences of others are ...

Toward an Instructionally Oriented Theory of ... - Wiley Online Library

arsdam, van den Bergh, & van Hout Wolters, 2006) provided good and poor models with ... Cleary, 2000; Schunk et al., 1987; Zimmerman & Kitsantas, 2002).

Social identity theory - Wiley Online Library

and various conditions under which these are thought more or less likely to be used[ ... "0870# in which he sought to integrate the then emerging trends in social cognition ... ing[ Such a view neglects their social role as tools for understanding ... esis has been trenchantly criticised by Turner "0888#[ The burden of his ...

General Systems Theory - Wiley Online Library

Keywords general system theory; GST*; General Systems Worldview; Maslow's hierarchy of needs; transdisciplinarity. INTRODUCTION. The Original Vision for a ...

Structural Functional Theory - Wiley Online Library

approach to family studies stresses the rela- tionships ... even though it is a theoretical perspective that has been ... moved on from structural functional theory,.

paleontology and evolutionary theory - Wiley Online Library

This principle is as applicable to artifacts as it is to parts of organisms. D. Paleontologists often speak of a popula- tion, or species, or higher category as being.

Mass Society Theory - Wiley Online Library

Mass society theory is a complex, multifaceted perspective. As applied to social movements, however, the basic idea is that people who are socially isolated are ...

Behaviorist Learning Theory - Wiley Online Library

Behaviorist learning theory is based on principles of behaviorism, which were developed during the first half of the 20th century. Learning was understood as a.

The genetical theory of kin selection - Wiley Online Library

The theory of kin selection describes how natural selection may be separated into direct and indirect components. Hamilton's rule captures this basic separa-.

Interpersonal Deception Theory - Wiley Online Library

Interpersonal deception theory (IDT) represents a merger of interpersonal communication and deception principles designed to better account for deception in ...

The Bullionist Controversy: Theory and New ... - Wiley Online Library

The Bullionist Controversy in the United Kingdom is one of the first de- bates about the determination of the price level and the exchange rate under a paper ...

Social Cognitive Theory - Wiley Online Library

Bandura's social cognitive theory is one of the most highly influential theories in the field of social psychology as it argues that people can learn behavioral ...

Postmodern Social Theory - Wiley Online Library

common characteristics of various postmodern theories, others have defined the field by those who work in it, and still others – particularly those who work in the ...

Critical Theory and Literacy - Wiley Online Library

In terms of literacy, critical theories associated with multiculturalism, cultural-historical approaches, policy analysis, linguistics and semiotics, development and ...

The functions of program theory - Wiley Online Library

The role of theory in program evaluation is an important but neglected area in evaluation practice and theory. Program theory has saleral important functions that ...

The Literary Theory Toolkit - Wiley Online Library

Song (Prose Is a Prose Is a Prose) ” ; to Jaime Davidovich for permission to ... allegorical is “ a truth hidden beneath a beautiful falsehood: such as when ... Samael. A zazel. A zael. M ahazael. P rinces of Devils. Phlegethon. C o cytus. Styx. A.

Frustration Aggression Theory - Wiley Online Library

Under these frustrating conditions aggressive behavior is stimulated ... In its first general definition the frustration aggression theory (or hypothesis, hence.

elements of information theory - Wiley Online Library

Elements of information theory/by Thomas M. Cover, Joy A. Thomas.–2nd ed. p. cm. ... material and solutions to selected problems. In the years since the first ...

Differential Association Theory - Wiley Online Library

Based on the seminal work of Edwin Sutherland. (1940), differential association theory refers to the manner in which individuals learn the values, motivations ...

The Handbook of Criminological Theory - Wiley Online Library

co‐editor of Introduction to Criminal Justice: A Sociological Perspective (Stanford. University ... York University Press 2012), and Crime and Society: Crime, 3rd Edition (Sage ... control, power‐control, control balance, see Gottfredson & Hirschi, 1990; Hagan,. Gillis ... chalfin_mccrary2014.pdf (accessed April 21, 2015). Cook ...