Skip to main content

Advertisement

Log in

Humanitarian NGO Security Networks and Organisational Learning: Identity Matters and Matters of Identity

  • Original Paper
  • Published:
VOLUNTAS: International Journal of Voluntary and Nonprofit Organizations Aims and scope Submit manuscript

Abstract

Since a few years, humanitarian non-governmental organisations (NGOs) are faced with increased insecurity in regions where armed conflicts prevail, such as in Afghanistan, Somalia or Sudan. An analysis of the NGOs’ reaction to this development based on 23 semi-structured interviews reveals that identity matters and plays a crucial role. On the one hand, for reasons related to their identity, addressing this insecurity proves challenging for NGOs, which is why they tend to shy away from taking steps in this direction. On the other hand, identity can facilitate organisational learning and help overcome organisational barriers related to it. In this respect identity allows NGOs to join security networks and cooperate across NGO boundaries, while at the same time using it as an indicator to distinguish between who they can trust and who therefore is part of the network and who is not.

Résumé

Depuis quelques années, les organisations non gouvernementales (ONG) humanitaires sont confrontées à une insécurité croissante dans les régions en conflit armé, notamment en Afghanistan, en Somalie ou au Soudan. Une analyse de la réaction des ONG à cette évolution, basée sur 23 entretiens semi-directifs, révèle que leur identité joue un rôle primordial. D’une part, du fait même de leur identité, le comportement à adopter face à cette insécurité constitue un défi pour les ONG ; c’est pourquoi elles hésitent généralement à prendre des mesures en conséquence. D’autre part, cette identité peut faciliter l’apprentissage organisationnel et les aider à franchir les obstacles organisationnels qui y sont associés. Ainsi, l’identité des ONG leur permet de rejoindre des réseaux de sécurité et de coopérer au-delà de leurs limites respectives ; elle peut aussi servir d’indicateur pour faire la distinction entre les entités dignes de confiance, qui font donc partie du réseau, et les autres.

Zusammenfassung

Seit einigen Jahren werden humanitäre nicht-staatliche Organisationen mit einer erhöhten Unsicherheit in Regionen mit bewaffneten Auseinandersetzungen konfrontiert, zum Beispiel in Afghanistan, Somalia oder im Sudan. Eine Analyse der Reaktion der nicht-staatlichen Organisationen auf diese Entwicklung beruhend auf 23 leitfadengestützten Interviews zeigt, dass die Identität der NGOs eine wichtige Rolle spielt. Einerseits erweist sich die Handhabung dieser gefährlichen Situation für die nicht-staatlichen Organisationen aus Gründen, die mit ihrer Identität zusammenhängen, als schwierig, weswegen sie sich vor Maßnahmen in dieser Richtung scheuen. Andererseits kann die Identität das organisationale Lernen erleichtern und helfen, damit zusammenhängende organisationale Hindernisse zu überwinden. Insoweit ermöglicht die Identität den nicht-staatlichen Organisationen den Beitritt zu Sicherheitsnetzwerken sowie eine organisationsübergreifende Zusammenarbeit, während sie gleichzeitig als Indikator dafür dient, wem die Organisationen trauen können und wer demzufolge Teil des Netzwerks ist und wer nicht.

Resumen

Desde hace unos años, las organizaciones humanitarias no gubernamentales (ONG) se están enfrentando a una creciente inseguridad en regiones en las que prevalecen conflictos armados, tales como en Afganistán, Somalia y Sudán. Un análisis de la reacción de las ONG a esta situación basado en 23 entrevistas semi-estructuradas revela que la identidad importa y desempeña un papel crucial. Por un lado, por motivos relacionados con su identidad, abordar dicha inseguridad resulta complicado para las ONG, que es por lo que tienden a acobardarse a la hora de dar pasos en dicha dirección. Por otro lado, la identidad puede facilitar el aprendizaje organizativo y ayudar a superar barreras organizativas relacionadas con la misma. En este sentido, la identidad permite a las ONG incorporarse a redes de seguridad y cooperar dentro de los límites de las ONG, utilizándola al mismo tiempo como un indicador para distinguir entre aquellos en los puede confiar y aquellos que, por consiguiente, forman parte de la red y aquellos que no.

摘要

近年来,人道主义非政府组织(NGO)在武装冲突蔓延的地方面临着越来越危险的局面,比如在阿富汗、索马里、苏丹等。基于23个半结构化采访开展的NGO对上述事态的响应分析表明,身份发挥着重要的作用。一方面,由于与NGO身份相关的原因,解决这一不安全局面对NGO而言挑战重重,这是为什么NGO通常不采取措施解决这一挑战。另一方面,身份有利于组织认知,有助于克服相关的组织障碍。在这一方面,身份使NGO能加入安全网络,与各个领域的NGO展开合作,同时以此作为指示标志,区分其可以信赖的组织,分辨其他组织是否为安全网络的组成部分。

ملخص

منذ بضع سنوات، تواجه المنظمات الإنسانية الغير حكومية (NGOs) زيادة في إنعدام الأمن في المناطق التي تسود فيها الصراعات المسلحة ، كما هو الحال في أفغانستان والصومال أو السودان. تحليل رد فعل المنظمات الغير حكومية (NGOs) إلى هذا التطور يعتمد على 23 من المقابلات شبه منظمة يكشف عن أن الهوية شئ مهم وتلعب دورا˝ حاسما˝. من ناحية، لأسباب تتعلق بهويتهم، معالجة هذا يثبت أن إنعدام الأمن تحدي للمنظمات الغير حكومية (NGOs)، الذي هو السبب في إنها تميل إلى الخجل من إتخاذ خطوات في هذا الاتجاه. من ناحية أخرى، يمكن أن الهوية تسهل التعلم التنظيمي وتساعد في التغلب على الحواجز التنظيمية المتصلة به. في هذا الصدد الهوية تسمح للمنظمات الغير حكومية (NGOs) إلى الإنضمام إلى شبكات الأمن والتعاون عبر حدود المنظمات الغير حكومية (NGOs)، بينما في الوقت نفسه تستخدمه كمؤشر للتمييز بين الذين يمكنهم أن يثقوا بهم وبالتالي الذين هم جزء من الشبكة والذين ليس كذلك.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1

Similar content being viewed by others

Notes

  1. Author's interview with an NGO security expert, 31 August 2011.

  2. These names are used synonymously throughout the analysis.

  3. Author's interview with an NGO security expert, 07 December 2011.

  4. Author's interview with an NGO security expert, 23 August 2011, author's interview with an NGO security expert, 07 December 2011.

  5. Author's interview with an NGO security expert, 14 January 2010.

  6. Author's interview with an NGO security expert, 29 September 2009.

  7. Author's interview with an NGO security expert, 26 January 2012.

  8. Author's interview with an NGO security expert, 23 August 2011.

  9. Author's interview with an NGO security expert, 31 August 2011.

  10. Author's interview with an NGO security expert, 31 August 2011.

  11. Author's interview with an NGO security expert, 31 August 2011.

  12. Author's interview with an NGO security expert, 31 August 2011.

  13. Author's interview with an NGO security expert, 09 September 2011.

  14. Author's interview with an NGO security expert, 23 August 2011.

  15. Author's interview with an NGO security expert, 31 August 2011.

  16. Author's interview with an NGO security expert, 31 August 2011.

  17. Author's interview with an NGO security expert, 26 January 2012; see also author's interview with an NGO security expert, 20 March 2012, author's interview with an NGO security expert, 09 September 2011.

  18. Author's interview with an NGO security expert, 15 December 2011.

  19. For other formal and informal security networks see Bickley (2006, pp. 13-15).

  20. Author's interview with an NGO security expert, 31 August 2011.

  21. Author's interview with an NGO security expert, 31 August 2011; see also author's interview with an NGO security expert, 17 January 2012.

  22. Author's interview with an NGO security expert, 23 August 2011.

  23. Author's interview with an NGO security expert, 23 August 2011.

  24. Author's interview with an NGO security expert, 17 January 2012.

  25. Author's interview with an NGO security expert, 17 January 2012.

  26. Author's interview with an NGO security expert, 23 August 2011.

  27. Author's interview with an NGO security expert, 23 August 2011.

  28. Author's interview with an NGO security expert, 23 August 2011.

  29. Author's interview with an NGO security expert, 17 January 2012.

  30. Author's interview with an NGO security expert, 26 January 2012.

  31. Author's interview with an NGO security expert, 17 May 2012.

  32. Author's interview with an NGO security expert, 17 May 2012.

  33. Author's interview with an NGO security expert, 17 May 2012.

  34. Author's interview with an NGO security expert, 10 October 2011.

  35. Author's interview with an NGO security expert, 07 December 2011.

  36. Author's interview with an NGO security expert, 20 October 2011; see also author's interview with an NGO security expert, 26 January 2012; author's interview with an NGO security expert, 12 October 2011.

  37. Author's interview with an NGO security expert, 20 October 2011.

  38. Author's interview with an NGO security expert, 23 August 2011.

  39. Author's interview with an NGO security expert, 23 August 2011.

  40. Author's interview with an NGO security expert, 10 October 2011.

  41. Author's interview with an NGO security expert, 30 May 2012.

  42. Author's interview with an NGO security expert, 09 September 2011; see also author's interview with an NGO security expert, 26 January 2012.

  43. Author's interview with an NGO security expert, 12 April 2012.

  44. Author's interview with an NGO security expert, 15 December 2011.

  45. Author's interview with an NGO security expert, 15 December 2011.

  46. Author's interview with an NGO security expert, 23 August 2011.

  47. Author's interview with an NGO security expert, 16 March 2012.

  48. Author's interview with an NGO security expert, 12 April 2012.

  49. Author's interview with an NGO security expert, 26 January 2012.

  50. Author's interview with an NGO security expert, 25 April 2012.

  51. Author's interview with an NGO security expert, 07 December 2011.

  52. Author's interview with an NGO security expert, 23 August 2011.

  53. Author's interview with an NGO security expert, 31 August 2011.

  54. Author's interview with an NGO security expert, 31 August 2011.

  55. Author's interview with an NGO security expert, 31 August 2011.

  56. Author's interview with an NGO security expert, 26 January 2012.

  57. Author's interview with an NGO security expert, 07 December 2011, author's interview with an NGO security expert, 31 August 2011, author's interview with an NGO security expert, 16 March 2012.

  58. Author's interview with an NGO security expert, 15 December 2011.

  59. Author's interview with an NGO security expert, 07 December 2011; see also author's interview with an NGO security expert, 15 December 2011.

  60. Author's interview with an NGO security expert, 12 April 2012.

  61. Author's interview with an NGO security expert, 16 March 2012.

  62. Author's interview with an NGO security expert, 07 December 2011.

  63. Author's interview with an NGO security expert, 07 December 2011.

  64. Author's interview with an NGO security expert, 17 November 2011; see also author's interview with an NGO security expert, 04 November 2011.

  65. Author's interview with an NGO security expert, 17 November 2011.

  66. Author's interview with an NGO security expert, 18 November 2011.

  67. Author's interview with an NGO security expert, 09 September 2011.

  68. Author's interview with an NGO security expert, 09 September 2011; author's interview with an NGO security expert, 31 August 2011; author's interview with an NGO security expert, 23 August 2011.

  69. Author's interview with an NGO security expert, 09 September 2011.

  70. Author's interview with an NGO security expert, 29 August 2012.

  71. Author's interview with an NGO security expert, 29 August 2012.

  72. Author's interview with an NGO security expert, 29 August 2011.

  73. Author's interview with an NGO security expert, 20 October 2011.

  74. Author's interview with an NGO security expert, 23 August 2011.

  75. Author's interview with an NGO security expert, 26 January 2012.

  76. Author's interview with an NGO security expert, 17 March 2010.

  77. Author's interview with an NGO security expert, 26 January 2012.

  78. Author's interview with an NGO security expert, 18 November 2011.

  79. Author's interview with an NGO security expert, 18 November 2011.

  80. Author's interview with an NGO security expert, 17 November 2011.

  81. Author's interview with an NGO security expert, 17 November 2011.

  82. Author's interview with an NGO security expert, 25 April 2012, see also author's interview with an NGO security expert, 17 November 2011.

  83. An earlier version of this article was presented at the Second GR:EEN Annual Conference at the University of Warwick, 8-9 November 2012. Author's interview with an NGO security expert, 30 May 2012.

References

  • ACT Alliance. (2011a). Staff safety and security principles for the ACT alliance. Retrieved January 15, 2012 from http://www.actalliance.org/resources/policies-and-guidelines/security/Staff%20Safety%20and%20Security%20Principles%20for%20the%20ACT%20Alliance_Appr05Feb11_ENGLISH.pdf.

  • ACT Alliance. (2011b). ACT staff safety and security guidelines. A handbook for ACT staff. Retrieved January 15, 2012 from http://www.actalliance.org/resources/policies-and-guidelines/security/ACT_Saff_Safety_-_Security_Guidelines_vers_2011.pdf.

  • ACT Alliance. (2012). Home. Retrieved July 30, 2012 from http://www.actalliance.org/.

  • Aiken, M., & Britton, B. (2007). The learning organization and the voluntary sector. In J. A. Cook, D. Staniforth, & J. Stewart (Eds.), The learning organization in the public services (pp. 162–181). Aldershot: Gower.

    Google Scholar 

  • Aldashev, G., & Verdier, T. (2010). Goodwill bazaar: NGO competition and giving to development. Journal of Development Economics, 91(1), 48–63.

    Article  Google Scholar 

  • Alter, C., & Hage, J. (1993). Organizations working together. Newbury Park, CA: Sage.

    Google Scholar 

  • ANSO. (2012). About ANSO. Retrieved December 7, 2012 from http://www.ngosafety.org/about.html.

  • Argyris, C., & Schön, D. A. (2007). Theory in practice. Increasing professional effectiveness. San Francisco: Jossey-Bass Publishers.

    Google Scholar 

  • Barnett, M. (2009). Evolution without progress? Humanitarianism in a world of hurt. International Organization, 63(4), 621–663.

    Article  Google Scholar 

  • Barnett, M., & Snyder, J. (2008). The grand strategies of humanitarianism. In M. Barnett & T. G. Weiss (Eds.), Humanitarianism in question. Politics, power, ethics (pp. 143–171). Ithaca: Cornell University Press.

    Google Scholar 

  • Barnett, M., & Weiss, T. G. (2008). Humanitarianism. A brief history of the present. In M. Barnett & T. G. Weiss (Eds.), Humanitarianism in question. Politics, power, ethics (pp. 1–48). Ithaca: Cornell University Press.

    Google Scholar 

  • Bickley, S. (2006). NGO security collaboration guide. Brussels: ECHO.

    Google Scholar 

  • Boli, J., & Thomas, G.M. (1997). World culture in the world polity: A century of international non-governmental organization. American Sociological Review, 62(2), 171–190.

    Article  Google Scholar 

  • Bronner, U. (2003). Humanitäre Helfer in Krisengebieten. Motivation, Einsatzerleben, Konsequenzen—Eine psychologische Analyse. Münster: LIT-Verlag.

    Google Scholar 

  • Carle, A., & Chkam, H. (2006). Humanitarian action in the new security environment: Policy and operational implications in Iraq. HPG Background Paper. London: ODI.

  • Cooley, A., & Ron, J. (2002). The NGO scramble. Organizational insecurity and the political economy of transnational action. International Security, 27(1), 5–39.

    Article  Google Scholar 

  • Dijkzeul, D. (2004). Mapping international humanitarian organizations. Humanitäres Völkerrecht. Informationsschriften, 4, 216–225.

    Google Scholar 

  • Ebrahim, A. (2005). NGOs and organizational change. Discourse, reporting, and learning. Cambridge: Cambridge University Press.

    Google Scholar 

  • Edwards, M. (1997). Becoming a learning organization, or, the search for the Holy Grail? In D. W. Gillies (Ed.), Strategies of public engagement: Shaping a Canadian agenda for international co-operation (pp. 63–94). Montreal: McGill-Queen’s University Press.

    Google Scholar 

  • EISF. (2012). Resources. Retrieved May 09, 2012 from http://www.eisf.eu/resources/home.asp.

  • EU. (2013). Towards a European Consensus on humanitarian aid. Retrieved February 26, 2013 from http://europa.eu/legislation_summaries/humanitarian_aid/r13008_en.htm.

  • Fast, L. (2010). Mind the gap: Documenting and explaining violence against aid workers. European Journal of International Relations, 16(1), 365–389.

    Article  Google Scholar 

  • Fast, L., Freeman, C. F., O’Neill, M., & Rowley, E. (2013). In acceptance we trust? Conceptualising acceptance as a viable approach to NGO security management. Disasters, 37(2), 222–243.

    Article  Google Scholar 

  • Fast, L., & O’Neill, M. (2010). A closer look at acceptance. Humanitarian Exchange, 47, 4–6.

    Google Scholar 

  • Fearon, J. D. (2008). The rise of emergency aid. In M. Barnett & T. G. Weiss (Eds.), Humanitarianism in question. Politics, power, ethics (pp. 49–72). Ithaca: Cornell University Press.

    Google Scholar 

  • Fearon, J. D., & Laitin, D. D. (2000). Violence and the social construction of ethnic identity. International Organization, 54(4), 845–877.

    Article  Google Scholar 

  • Finucane, C. (2013). The cost of security risk management for NGOs. EISF Report.

  • Gaul, A., Keegan, M., Lawrence, M., & Ramos, M. L. (2006). NGO security: Does gender matter? Save the children USA. Retrieved April 14, 2013 from http://acceptanceresearch.files.wordpress.com/2010/10/ngo-security-does-gender-matter.pdf.

  • Glaser, M. (2011). Engaging private security providers: A guideline for non-governmental organisations. EISF Briefing Paper. London: EISF.

  • Gross Stein, J. (2008). Humanitarian organizations. Accountable—Why, to whom, for what, and how? In M. Barnett & T. G. Weiss (Eds.), Humanitarianism in question. Politics, power, ethics (pp. 124–142). Ithaca: Cornell University Press.

    Google Scholar 

  • Hermann, M. G. (2009). Content analysis. In A. Klotz & D. Prakash (Eds.), Qualitative methods in international relations. A pluralist guide (pp. 151–167). Houndmills, Basingstoke: Palgrave Macmillan.

    Google Scholar 

  • Humanitarian Outcomes. (2012). Aid worker security report 2012. Preview: Figures at a glance. Retrieved August 24, 2012 from https://aidworkersecurity.org/sites/default/files/AWSDReport2012Preview.pdf.

  • Humanitarian Practice Network. (2010a). Humanitarian Exchange number 47, June 2010. London: ODI.

  • Humanitarian Practice Network. (2010b). Operational security management in violent environments. Good Practice Review 8 (Revised ed.). London: ODI.

  • ICRC. (2007). Stay safe: The International Federation’s guide for security managers. Geneva: ICRC.

    Google Scholar 

  • INSO. (2013). International NGO safety organisation. Retrieved February 06, 2013 from http://www.ngosafety.org/.

  • INSSA. (2012a). About. Retrieved August 09, 2012 from http://ingossa.org/page/about.

  • INSSA. (2012b). Advocacy. Retrieved August 09, 2012 from http://ingossa.org/page/advocacy.

  • INSSA. (2012c). Programs. Retrieved August 09, 2012 from http://ingossa.org/page/programs.

  • InterAction. (2012). Security Advisory Group. About us. Retrieved August 10, 2012 from http://security.interaction.org/about-us.

  • InterAction. (2013a). Retrieved April 11, 2013 from http://www.interaction.org/work/security.

  • InterAction. (2013b). Retrieved April 14, 2013 from http://www.interaction.org/about-interaction.

  • Keck, M., & Sikkink, K. (1998). Activists beyond borders: Advocacy networks in international politics. Cambridge: Cambridge University Press.

    Google Scholar 

  • Kingston, M., & Behn, O. (2010). Risk thresholds in humanitarian assistance. EISF Report. London: EISF.

  • Macpherson, R. (2004). CARE international safety & security handbook. Geneva: CARE.

    Google Scholar 

  • Martin, R. (1999). NGO field security. Forced Migration, 2(4), 4–7.

    Google Scholar 

  • Mayring, P. (2002). Einführung in die qualitative Sozialforschung. Eine Anleitung zu qualitativem Denken (5th ed.). Weinheim: Beltz Verlag.

    Google Scholar 

  • Micheni, K., & Kuhanendran, J. (2010). Saving Lives Together. A review of security collaboration between the United Nations and humanitarian actors on the ground. London: Christian Aid. Retrieved August 24, 2012 from http://www.christianaid.org.uk/images/savinglivestogether.pdf.

  • Mujawar, S. (2009). Security management in humanitarian agencies. Santa Monica, CA: International Medical Corps. Retrieved April 19, 2012 from http://www.ngovoice.org/documents/IMC%20-%20Security%20Management%20in%20Humanitarian%20Agencies_Survey%20Summary.pdf.

  • NSP. (2012). What is NSP? Retrieved August 10, 2012 from http://www.nspsomalia.org/joomla/index.php/about-nsp/what-is-nsp.

  • PakSafe. (2011). PakSafe Advisory 11—Risk management and best abduction response. Retrieved March 15, 2012 from http://pakhumanitarianforum.org/downloads/press-releases/Advisory%20-11%204%2011%20Abduction%20Risk%20Management.pdf.

  • PakSafe. (2012). About PakSafe. Retrieved March 15, 2012 from http://pakhumanitarianforum.org/paksafe/about-paksafe.

  • Pappi, F. U. (1993). Policy-Netze: Erscheinungsform moderner Politiksteuerung oder methodischer Ansatz? In A. Héritier (Ed.), Policy-Analyse. Kritik und Neuorientierung (pp. 84–94). Opladen: Westdeutscher Verlag.

    Chapter  Google Scholar 

  • Powell, W. W., & DiMaggio, P. J. (1991). The new institutionalism in organizational analysis. Chicago: The University of Chicago Press.

    Google Scholar 

  • Renouf, J. (2011). Understanding how the identity of international aid agencies and their approaches to security are mutually shaped. A thesis submitted to the Department of International Relations for the degree of Doctor of Philosophy, London. Retrieved August 24, 2012 from http://etheses.lse.ac.uk/171/1/Renouf_Understanding_How_the_Identity_of_International_Aid_Agencies_and_Their_Approaches_to_Security_Are_Mutually_Shaped.pdf.

  • Risse, T., & Sikkink, K. (1999). The socialization of international human rights norms into domestic practices: Introduction. In T. Risse, S. C. Ropp, & K. Sikkink (Eds.), The power of human rights: International norms and domestic change (pp. 1–38). Cambridge: Cambridge University Press.

    Chapter  Google Scholar 

  • Seybolt, T. B. (2009). Harmonizing the humanitarian aid network: Adaptive change in a complex system. International Studies Quarterly, 53(4), 1027–1050.

    Article  Google Scholar 

  • Smillie, I., & Minear, L. (2004). The charity of nations: Humanitarian action in a calculating world. Bloomfield, CT: Kumarian Press.

    Google Scholar 

  • Somalia NGO Consortium. (2012). The NGO safety programme. Retrieved February 24, 2012 from http://www.somaliangoconsortium.org/services/nsp.

  • South Sudan NGO Forum. (2012). Who we are. Retrieved July 19, 2012 from http://southsudanngoforum.org/who-we-are/.

  • Stoddard, A., & Harmer, A. (2010). Supporting security for humanitarian action: A review of critical issues for the humanitarian community. Dublin: Humanitarian Outcomes.

    Google Scholar 

  • Stoddard, A., Harmer, A., & DiDomenico, V. (2009). Providing aid in insecure environments. 2009 Update. Trends in violence against aid workers and the operational response. HPG Policy Brief 34. London: ODI.

  • Stoddard, A., Harmer, A., & Haver, K. (2006). Providing aid in insecure environments: Trends in policy and operations. HPG Report No. 23. London: ODI.

  • Stoddard, A., Harmer, A., & Haver, K. (2011). Aid worker security report 2011: Spotlight on security for national aid workers: Issues and perspectives. Dublin: Humanitarian Outcomes.

    Google Scholar 

  • Swieringa, J., & Wierdsma, A. (1992). Becoming a learning organization. Beyond the learning curve (pp. 33–35). Workingham: Addison-Wesley Publishing Company.

    Google Scholar 

  • Thompson, E. (2008). Principled pragmatism: NGO engagement with armed actors. Monrovia: World Vision International.

    Google Scholar 

  • Topçu, Y. (1999). Humanitarian NGO-networks. Identifying powerful political actors in an international policy-field. Berlin: Wissenschaftszentrum Berlin für Sozialforschung.

    Google Scholar 

  • UN. (1999). Humanitarian assistance and assistance to refugees, 1999. Retrieved March 31, 2010 from http://ww.un.org/ha/general.htm.

  • Van Brabant, K. (1998). Cool ground for aid providers: Towards better security management in aid agencies. Disasters, 22(2), 109–125.

    Article  Google Scholar 

  • Van Brabant, K. (2001a). Organizational & institutional learning in the humanitarian sector. In O. Barrow & M. Jennings (Eds.), The charitable impulse. NGOs & development in East & North-East Africa (pp. 183–199). Oxford: James Currey and Kumarian Press.

    Google Scholar 

  • Van Brabant, K. (2001b). Mainstreaming safety and security management in aid agencies. A review of aid agency practices and a guide for management. HPG Report 9. London: ODI.

  • Van Brabant, K. (2010). Managing aid agency security in an evolving world: The larger challenge. London: EISF.

    Google Scholar 

  • Vaughn, J. (2009). The unlikely securitizer: Humanitarian organizations and the securitization of indistinctiveness. Security Dialogue, 40(3), 263–285.

    Article  Google Scholar 

  • Wendt, A. (1994). Collective identity formation and the international state. The American Political Science Review, 88(2), 384–396.

    Article  Google Scholar 

Download references

Acknowledgments

The author would like to thank the valuable comments of the anonymous reviewers, Ebe Brons, Chase Hannon, Heather Hughes, Jutta Joachim, Thomas Kaye, Javeria Malik, Maarten Merkelbach, Lisa Reilly and EISF, Sicko Pijpker, Jean Renouf, Barry Steyn and Lawrence Tucker-Gardiner. The author also thanks Natalia Dalmer, Pia Honerath, Henriette Lange, Wiebke Pielhop and Debra Noe for their research assistance. Responsibility for any errors lies with the author.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Andrea Schneiker.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Schneiker, A. Humanitarian NGO Security Networks and Organisational Learning: Identity Matters and Matters of Identity. Voluntas 26, 144–170 (2015). https://doi.org/10.1007/s11266-013-9401-6

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11266-013-9401-6

Keywords

Navigation