Advertisement

Security Management in Humanitarian Organisations

  • Bob Ghosn
Chapter

Abstract

Humanitarian organisations tend to follow a rather ambiguous approach to security. On the surface, they usually recognise the value of professionally managing their security. However, security management is still too often seen as an alien concept grudgingly imported into the humanitarian world.

References

  1. European Interagency Security Forum: Security to go: a risk management toolkit for humanitarian aid agencies, http://mhpss.net/?get=263/Security-to-go_A-Risk-Management-toolkit-for-humanitarian-Aid-Agencies3.pdf
  2. Hoppe K, Williamson C (2016) Dennis vs Norwegian Refugee Council: implications for duty of care. Online. ODI, http://odihpn.org/blog/dennis-vs-norwegian-refugee-council-implications-for-duty-of-care/ consulted on 24 June 2015

Further Reading

  1. Allié M (2011) Acting at any price? Humanitarian negotiations revealed: the MSF experience. Hurst & Company, LondonGoogle Scholar
  2. Behn O, Kingston M (2010) Whose risk is it anyway? Linking operational risk thresholds and organisational risk management. Humanitarian Exchange Magazine (47), June 2010Google Scholar
  3. Collinson S, Duffield M (2013) Paradoxes of presence: risk management and aid culture in challenging environments. Humanitarian Policy Group, Overseas Development InstituteGoogle Scholar
  4. Egeland J, Harmer A, Stoddard A (2011) To stay and deliver: good practice for humanitarians in complex security environments. United Nations Office for the Coordination of Humanitarian Affairs (OCHA)Google Scholar
  5. Fast L, O’Neill M (2010) A closer look at acceptance. Humanitarian Exchange Magazine, Issue 47, Humanitarian Practice NetworkGoogle Scholar
  6. HAP International (2013) Guide to the 2010 HAP standard in accountability and quality management. HAP International, GenevaGoogle Scholar
  7. Harmer A, Stoddard A, Toth K (2013) Aid Worker Security Report 2013: the new normal: coping with the kidnapping threat. Humanitarian OutcomesGoogle Scholar
  8. Humanitarian Outcomes. Aid Worker Security Database. http://www.aidworkersecurity.org
  9. Humanitarian Practice Network (2010) Operational security management in violent environments: Good Practice Review 8, revised edition. Overseas Development InstituteGoogle Scholar
  10. Kemp E, Merkelbach M (2011) Can you get sued? Legal liability of international humanitarian aid organisations towards their staff. Policy Paper, Security Management InitiativeGoogle Scholar
  11. Kingston M, Behn O (2010) Risk thresholds in humanitarian assistance. European Interagency Security ForumGoogle Scholar
  12. Kingston M, Behn O Risk transfer through hardening mentalities? Humanitarian Practice Network. Online. http://www.odihpn.org/the-humanitarian-space/blog/risk-transfer-through-hardening-mentalities
  13. Mission Ready. Online. Missionready.org.uk
  14. Roberts DL (2006) Staying alive: safety and security guidelines for humanitarian volunteers in conflict areas. International Committee of the Red CrossGoogle Scholar
  15. Stoddard A, Harmer A, Hughes M (2012) Aid Worker Security Report 2012: host states and their impact on security for humanitarian operation. Humanitarian OutcomesGoogle Scholar
  16. Van Brabant K (2010) Managing aid agency security in an evolving world: the larger challenge. European Interagency Security ForumGoogle Scholar
  17. Van Brabant K (2012) Incident statistics in aid worker safety and security management: using and producing them. European Interagency Security ForumGoogle Scholar
  18. Wille C, Fast L (2013) Shifting patterns in security incidents affecting humanitarian aid workers and agencies: an analysis of fifteen years of data (1996–2010). Insecurity InsightGoogle Scholar

Copyright information

© Springer International Publishing AG 2018

Authors and Affiliations

  1. 1.Independent Humanitarian WorkerBrusselsBelgium

Personalised recommendations