488 research outputs found

    Of 'true professionals' and 'ethical hero warriors': A gender-discourse analysis of private military and security companies

    Get PDF
    Private military and security companies (PMSCs) have gained increasingly in importance over the course of the past two decades. Yet, given the intransparency of the industry and the heterogeneity of the companies that comprise it, we thus far know little about the actors involved. In this article, we offer preliminary insights into the self-representation of PMSCs, based on a gender-discourse analysis of the homepages of select companies and their main professional associations. We argue that survival in an increasingly competitive industry not only hinges on size, market share or effectiveness, but is also inherently gendered. PMSCs and their associations draw on the one hand on civilized and accepted forms of masculinity and femininity, presenting themselves as 'highly skilled professional' military strategists and ordinary businesses akin to banks or insurance companies. At the same time, however, PMSCs also engage in strategies of (hyper)masculinization and pathologization to set themselves apart from mercenaries, their private competitors and state security forces. In this respect, companies appear to view themselves as 'ethical hero warriors'. Whether intended or not, their strategies have political consequences. Within the security industry, they contribute to the creation and maintenance of a norm regarding what constitutes a legitimate PMSC, to which more or less all companies strive to adhere. Vis-à-vis other security actors, these strategies seek to establish PMSCs as being superior because, unlike these actors, such companies are super-masculine and able to live up to the growing and sometimes contradictory demands of changing security contexts. © The Author(s) 2012

    Omineca Herald, December, 11, 1979

    Get PDF
    Item does not contain fulltextPaper presented at the ICAS Workshop, November 30-December 1.WĂŒrzburg : [S.n.

    External networks and institutional idiosyncrasies:the Common Security and Defence Policy and UNSCR 1325 on women, peace and security

    Get PDF
    In 2008, the Council of the European Union (EU) adopted a ‘Comprehensive Approach’ that outlines a strategy for securing gender mainstreaming; two years later, the Council introduced a set of indicators to assess its implementation. The EU was responding to the United Nations Security Council’s call for regional institutions to assist in implementing Security Council Resolution (UNSCR) 1325, adopted on 31 October 2000, concerning ‘women, peace and security’. This resolution sought to meet the ‘urgent need to mainstream a gender perspective into peacekeeping operations’. Considering that prior exposure to gender issues, resources and well-established relations with civil society and gender advocates are lacking, the adoption of both the Comprehensive Approach and the indicators, as well as the structures and procedures established since then as part of the EU’s Common Security and Defence Policy, requires some explanation. This article draws on feminist institutionalist approaches to argue that the impetus for change came from individuals and groups within the EU who were involved in external networks, both above and below the supranational level, who seized on institutional idiosyncrasies that also shaped the implementation of UNSCR 1325 in important ways

    “Gendering” European Security:Policy Changes, Reform Coalitions and Opposition in the OSCE

    Get PDF
    The OSCE has rarely been considered in scholarship on gender and security, even though it was one of the regional security organisations whose gender policy predated the United Nations Security Council’s call for more international attention to issues related to women, peace and security in October 2000. Based on an analysis of official OSCE documents and on semi-structured interviews, we trace the integration of gender issues in the OSCE and explore the rationale behind and the challenges associated with it. We identify two phases of gender policy change in the OSCE and show how the integration of UNSCR 1325 brought about an expansion of OSCE gender policy from an exclusive focus on “soft” security issues towards increased inclusion of gender in the area of “hard” security. Drawing on historical and feminist institutionalism, we argue that reform coalitions were crucial for the policy changes in the OSCE but that they encountered institutional and ideational barriers, which hampered implementation of the gender policy. In light of rising opposition, our analysis warns of a backlash that might jeopardise current achievements

    Twittering for talent: Private military and security companies between business and military branding

    Get PDF
    Private military and security companies (PMSCs) play an increasingly important role in the provision of security-related services. In their attempts to win new clients and find suitable personnel, they take on different identities by presenting themselves as conventional businesses, military actors, and humanitarians. In this article, we examine how PMSCs deploy these identities when they recruit new personnel through social media. Our computer-assisted content analysis of Twitter messages posted by two major United States-based companies—CACI and DynCorp International—shows that while both PMSCs amplify their business and military identities to attract the most talented personnel, they construct and communicate these identities in different ways with CACI branding itself as a sophisticated, modern, and patriotic business and DynCorp as a home-grown, traditional military provider. In addition, our analysis lends force to scholars suggesting that state militaries and the private security sector compete increasingly for prospective employees using similar strategies. © 2018 The Author(s). Published by Informa UK Limited, trading as Taylor & Francis Group

    Polyaromatic Hydrocarbons with an Imperfect Aromatic System as Catalysts of Interstellar H2_{2} Formation

    Full text link
    Although H2_{2} is the simplest and the most abundant molecule in the Universe, its formation in the interstellar medium, especially in the photodissociation regions is far from being fully understood. According to suggestions, the formation of H2_{2} is catalyzed by polyaromatic hydrocarbons (PAHs) on the surface of interstellar grains. In the present study, we have investigated the catalytic effect of small PAHs with an imperfect aromatic system. Quantum chemical computations were performed for the H-atom-abstraction and H-atom-addition reactions of benzene, cyclopentadiene, cycloheptatriene, indene, and 1H-phenalene. Heights of reaction barriers and tunneling reaction rate constants were computed with density functional theory using the MPWB1K functional. For each molecule, the reaction path and the \warn{rate constants} were determined at 50 K using ring-polymer instanton theory, and the temperature dependence of the \warn{rate constants} was investigated for cyclopentadiene and cycloheptatriene. The computational results reveal that defects in the aromatic system compared to benzene can increase the rate of the catalytic H2_{2} formation at 50 K

    Origins of Replication in Sorangium cellulosum and Microcystis aeruginosa

    Get PDF
    The genome of Sorangium cellulosum has recently been completely sequenced, and it is the largest bacterial genome sequenced so far. In their report, Schneiker et al. (in Complete genome sequence of the myxobacterium Sorangium cellulosum, Nat. Biotechnol., 2007, 25, 1281–1289) concluded that ‘In the absence of the GC-skew inversion typically seen at the replication origin of bacterial chromosomes, it was not possible to discern the location of oriC’. In addition, the complete genome of Microcystis aeruginosa NIES-843 has also been recently sequenced, and in this report, Kaneko et al. (in Complete genomic structure of the bloom-forming toxic cyanobacterium Microcystis aeruginosa NIES-843, DNA Res., 2007, 14, 247–256) concluded that ‘there was no characteristic pattern, according to GC skew analysis’. Therefore, oriC locations of the above genomes remain unsolved. Using Ori-Finder, a recently developed computer program, in both genomes, we have identified candidate oriC regions that have almost all sequence hallmarks of bacterial oriCs, such as asymmetrical nucleotide distributions, being adjacent to the dnaN gene, and containing DnaA boxes and repeat elements

    Absence of the highly expressed small carbohydrate-binding protein Cgt improves the acarbose formation in Actinoplanes sp. SE50/110

    Get PDF
    Schaffert L, Schneiker-Bekel S, Gierhake J, et al. Absence of the highly expressed small carbohydrate-binding protein Cgt improves the acarbose formation in Actinoplanes sp. SE50/110. Applied Microbiology and Biotechnology. 2020;104:5395–5408.Actinoplanes sp. SE50/110 (ATCC 31044) is the wild type of industrial producer strains of acarbose. Acarbose has been used since the early 1990s as an inhibitor of intestinal human α-glucosidases in the medical treatment of type II diabetes mellitus. The small secreted protein Cgt, which consists of a single carbohydrate-binding module (CBM) 20-domain, was found to be highly expressed in Actinoplanes sp. SE50/110 in previous studies, but neither its function nor a possible role in the acarbose formation was explored, yet. Here, we demonstrated the starch-binding function of the Cgt protein in a binding assay. Transcription analysis showed that the cgt gene was strongly repressed in the presence of glucose or lactose. Due to this and its high abundance in the extracellular proteome of Actinoplanes, a functional role within the sugar metabolism or in the environmental stress protection was assumed. However, the gene deletion mutant ∆cgt, constructed by CRISPR/Cas9 technology, displayed no apparent phenotype in screening experiments testing for pH and osmolality stress, limited carbon source starch, and the excess of seven different sugars in liquid culture and further 97 carbon sources in the Omnilog Phenotypic Microarray System of Biolog. Therefore, a protective function as a surface protein or a function within the retainment and the utilization of carbon sources could not be experimentally validated. Remarkably, enhanced production of acarbose was determined yielding into 8–16% higher product titers when grown in maltose-containing medium

    Forum: Militarization 2.0: Communication and the normalization of political violence in the digital age

    Get PDF
    Scholars of international relations frequently explore how states normalize the use of military force through processes of militarization, yet few have analyzed how new information and communication technologies impact on these processes. The essays in this forum address this gap, and consider the political significance of new technologies, new actors, and new practices that shape Militarization 2.0 and normalize political violence in the digital age. The authors in this forum rely, to varying degrees, on common militarized tropes and dichotomies (such as authenticity, belonging, and (de)humanizing framings) that are key to militarization, including those devices that rest on gender, race/ethnicity, and heteronormativity. Moving beyond a military-centered approach to militarization, the authors\u27 questions cover ministries of foreign affairs; the embodied performances of celebrity leaders and insurgency groups; arms producers, the military video game industry, and private military and security companies; and violence entrepreneurs. The forum closes with reflections from Cynthia Enloe

    Forum: Militarization 2.0: Communication and the Normalization of Political Violence in the Digital Age

    Get PDF
    Scholars of international relations frequently explore how states normalize the use of military force through processes of militarization, yet few have analyzed how new information and communication technologies impact on these processes. The essays in this forum address this gap, and consider the political significance of new technologies, new actors, and new practices that shape “Militarization 2.0” and normalize political violence in the digital age. The authors in this forum rely, to varying degrees, on common militarized tropes and dichotomies (such as authenticity, belonging, and (de)humanizing framings) that are key to militarization, including those devices that rest on gender, race/ethnicity, and heteronormativity. Moving beyond a military-centered approach to militarization, the authors’ questions cover ministries of foreign affairs; the embodied performances of celebrity leaders and insurgency groups; arms producers, the military video game industry, and private military and security companies; and violence entrepreneurs. The forum closes with reflections from Cynthia Enloe
    • 

    corecore