Conjuring Zones of Insecurity: Post-Conflict Election Campaigning by Text Message in Aceh, Indonesia
In this article, Jesse Hession Grayman and Bobby Anderson describe the use of text messaging during the post-conflict election campaigning in Aceh, Indonesia.
Applicability of Open Source Systems (Ushahidi) for Security Management, Incident and Crisis Mapping: Acción contra el Hambre (ACF-Spain) Case Study
In this article, Gonzalo de Palacios analyses the Ushahidi system and its applicability to security risk management, particularly incident and crisis mapping.
A Principled Approach to Data Management: Lessons Learned from Medair’s Experience in Lebanon Using Last Mile Mobile Solutions
In this article, Joel Kaiser and Rob Fielding describe the lessons Medair learned from its experience of using last mile mobile solutions in Lebanon.
Whispering when Everyone is Listening: Low-Tech Communications Technology Implementations in High-Risk Contexts
In this article, Keith Porcaro and Laura Walker Hudson examine relevant case studies around the use of communications technology in high-risk contexts and suggest useful programme practices for high-risk implementations, from community outreach and crafting message content to implementation practices that minimise risk to staff, community members, and user data.
Library item | 2010 | NGO Security Management
This revised GPR both updates the original material and introduces new topics. In particular, it presents a more detailed and refined approach to undertaking risk assessments specifically oriented to field practitioners.
International NGOs' Security Manager: Mindset, Attributes, Skills and Knowledge of Today's Humanitarian Security ProfessionalLibrary item | 2017 | NGO Security Management
This academic thesis examines the mindset, attributes, skills and knowledge of contemporary humanitarian security professionals. Its conclusions, based on a literature review and key informant interviews, are that the majority of security managers are from uniformed backgrounds, are often considered as obstacles for conducting NGO activities and need to adopt a broad skill-set and the right mindset to change perceptions.
Library item | 2018 | NGO Security Management
This report summarises an academic thesis on sexual harassment, abuse and exploitation in the aid sector.
EISF publication | 2018 | NGO Security Management
This document contains information on EISF's reports, briefing papers, articles and guides.
This document contains ten tips for supporting yourself after experiencing a traumatic event.
Library item | 2017 | NGO Security Management
This paper is part of a research project that maps and evaluates international mechanisms that can be used to investigate attacks on healthcare.