Skip to main content

Security Management in Humanitarian Organisations

  • Chapter
  • First Online:
Book cover International Humanitarian Action
  • 65k Accesses

Abstract

Humanitarian organisations tend to follow a rather ambiguous approach to security. On the surface, they usually recognise the value of professionally managing their security. However, security management is still too often seen as an alien concept grudgingly imported into the humanitarian world.

Special thanks to Sadia Bundgaard for her valuable editing of this text.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 79.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 99.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 129.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    According to Aid Worker Security Database, in 2014, 190 major attacks targeted humanitarian workers, http://www.aidworkersecurity.org.

  2. 2.

    See European Interagency Security Forum: Security to go: a risk management toolkit for humanitarian aid agencies, http://mhpss.net/?get=263/Security-to-go_A-Risk-Management-toolkit-for-humanitarian-Aid-Agencies3.pdf.

  3. 3.

    See definitions above for Impact, Threat and Vulnerability.

  4. 4.

    As an example, in Iraq, a humanitarian organisation forced its staff to file leave requests before some field trips. In case of a security incident, the organisation could deny responsibility.

  5. 5.

    The signs of such prevailing culture are the number of disclaimers staff are required to sign.

  6. 6.

    There are obviously other sources of information ranging from open source media to confidential discussions with stakeholders.

  7. 7.

    Arrangements can range from a WhatsApp dedicated group to a specific radio channel, depending on the context.

  8. 8.

    The Good Humanitarian Donorship has contributed to this discussion.

  9. 9.

    If preferred communication means are not available 24/7 alternate communication system should be set up, including emergency telephone numbers etc.

  10. 10.

    Medical data from the support process should be managed in accordance with medical ethics.

  11. 11.

    For details on acceptance, please refer to the Acceptance Toolkit: http://acceptanceresearch.files.wordpress.com/2012/01/acceptance-toolkit-final-for-print-with-notes.pdf.

  12. 12.

    Here the contracting agency is the organisation that subcontracts the implementation to an implementation partner.

  13. 13.

    For a thorough analysis of the consequences of this case, see Hoppe and Williamson, ODI HPN, April 2016.

  14. 14.

    According to Aid Worker Security Database, in 2014, 329 humanitarian workers were hurt in a security incident, 121 were killed, 88 injured and 120 kidnapped.

  15. 15.

    The most renowned is the Economist Intelligence Unit that focuses on the economy. Some private intelligence agencies, such as Stratfor or Control risk, focus more on security while others such as Site Intel Group focus specifically on violent and jihadi groups.

  16. 16.

    What we can learn from the epic failure of Google flu trends, http://www.wired.com/2015/10/can-learn-epic-failure-google-flu-trends.

  17. 17.

    For more on stress management in humanitarian organisations, please refer to the Antares Foundation (www.antaresfoundation.org) and the Headington Institute (www.headington-institute.org).

References

Further Reading

  • Allié M (2011) Acting at any price? Humanitarian negotiations revealed: the MSF experience. Hurst & Company, London

    Google Scholar 

  • Behn O, Kingston M (2010) Whose risk is it anyway? Linking operational risk thresholds and organisational risk management. Humanitarian Exchange Magazine (47), June 2010

    Google Scholar 

  • Collinson S, Duffield M (2013) Paradoxes of presence: risk management and aid culture in challenging environments. Humanitarian Policy Group, Overseas Development Institute

    Google Scholar 

  • Egeland J, Harmer A, Stoddard A (2011) To stay and deliver: good practice for humanitarians in complex security environments. United Nations Office for the Coordination of Humanitarian Affairs (OCHA)

    Google Scholar 

  • Fast L, O’Neill M (2010) A closer look at acceptance. Humanitarian Exchange Magazine, Issue 47, Humanitarian Practice Network

    Google Scholar 

  • HAP International (2013) Guide to the 2010 HAP standard in accountability and quality management. HAP International, Geneva

    Google Scholar 

  • Harmer A, Stoddard A, Toth K (2013) Aid Worker Security Report 2013: the new normal: coping with the kidnapping threat. Humanitarian Outcomes

    Google Scholar 

  • Humanitarian Outcomes. Aid Worker Security Database. http://www.aidworkersecurity.org

  • Humanitarian Practice Network (2010) Operational security management in violent environments: Good Practice Review 8, revised edition. Overseas Development Institute

    Google Scholar 

  • Kemp E, Merkelbach M (2011) Can you get sued? Legal liability of international humanitarian aid organisations towards their staff. Policy Paper, Security Management Initiative

    Google Scholar 

  • Kingston M, Behn O (2010) Risk thresholds in humanitarian assistance. European Interagency Security Forum

    Google Scholar 

  • Kingston M, Behn O Risk transfer through hardening mentalities? Humanitarian Practice Network. Online. http://www.odihpn.org/the-humanitarian-space/blog/risk-transfer-through-hardening-mentalities

  • Mission Ready. Online. Missionready.org.uk

  • Roberts DL (2006) Staying alive: safety and security guidelines for humanitarian volunteers in conflict areas. International Committee of the Red Cross

    Google Scholar 

  • Stoddard A, Harmer A, Hughes M (2012) Aid Worker Security Report 2012: host states and their impact on security for humanitarian operation. Humanitarian Outcomes

    Google Scholar 

  • Van Brabant K (2010) Managing aid agency security in an evolving world: the larger challenge. European Interagency Security Forum

    Google Scholar 

  • Van Brabant K (2012) Incident statistics in aid worker safety and security management: using and producing them. European Interagency Security Forum

    Google Scholar 

  • Wille C, Fast L (2013) Shifting patterns in security incidents affecting humanitarian aid workers and agencies: an analysis of fifteen years of data (1996–2010). Insecurity Insight

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Bob Ghosn .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG

About this chapter

Cite this chapter

Ghosn, B. (2018). Security Management in Humanitarian Organisations. In: Heintze, HJ., Thielbörger, P. (eds) International Humanitarian Action. Springer, Cham. https://doi.org/10.1007/978-3-319-14454-2_23

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-14454-2_23

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-14453-5

  • Online ISBN: 978-3-319-14454-2

  • eBook Packages: Law and CriminologyLaw and Criminology (R0)

Publish with us

Policies and ethics