To stay and deliver: good practice for humanitarians in complex security environments
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
[New York, N.Y.?]
Policy Development and Studies Branch (PDSB), UN Office for the Coordination of Humanitarian Affairs (OCHA)
c2011
|
Schriftenreihe: | Policy and studies series
|
Schlagworte: | |
Online-Zugang: | FAW01 FAW02 Volltext |
Beschreibung: | "Independent study commissioned by the Office for the Coordination of Humanitarian Affairs (OCHA)." Paralleltitel: Good practice for humanitarians in complex security environments Includes bibliographical references (p. 53-58) Authors -- Foreword -- Preface -- Acknowledgments -- Advisory Group Members -- Acronyms -- Glossary -- Executive Summary -- 1. Introduction -- 1.1. Background and aims of the study: Why humanitarian security, and why now? -- 1.2. Methodology -- 1.3. Key concepts and recent developments in humanitarian operational security -- 2. The threat environment: Challenges to secure and effective humanitarian access -- 2.1. Trends in security for humanitarian workers -- 2.2. Differentiating threat contexts -- 2.3. Intrinsic vulnerabilities of the humanitarian community -- 3. Good practice for gaining and maintaining access in high-risk environments -- 3.1. Active acceptance-based approaches -- 3.2. Negotiating access -- 3.3. Remote programming: Strategic localisation of operations, not risk transfer -- 3.4. Low-profile approaches -- 3.5. Protective measures: 'Smart protection', not bunkerisation -- 3.6. Deterrent measures: Issues around armed protection -- 3.7. Other operational means for enhancing secure access: Programming options, coordination, partnerships, and resourcing -- 4. Political constraints -- 4.1. The role of host governments -- 4.2. States, specifically donor governments -- 4.3. Non-state armed actors and the terrorist label -- 4.4. International humanitarian advocacy and negotiation -- 5. National and local humanitarian actors: Key issues -- 5.1. National perspectives on threat and risk -- 5.2. Duty of care and responsible partnership -- 5.3. Coordination and consultation -- 5.4. Principles and perceptions -- 6. Conclusions and recommendations -- Bibliography -- Annexes -- 1. Study concept note -- 2. People interviewed -- 3. Survey instrument and summary results -- 4. Legal documents "Providing humanitarian assistance amid conflict has always been a dangerous and difficult endeavour; however, over the last decade aid worker casualties tripled, reaching over 100 deaths per year. From 2005 onwards the largest numbers of violent attacks on humanitarian personnel have been concentrated in a small number of countries representing the most difficult and volatile operating environments. Attacks in some of these settings have also grown more lethal and sophisticated and the number of kidnappings has risen dramatically. As a result, the humanitarian footprint has shrunk in some conflict areas where violence has surged in recent years, such as Afghanistan, Pakistan, and Somalia. Access can diminish both as a direct result of violence and as a consequence of the obstacles and conditions created by militaries, governments, and nonstate actors that hinder the impartial provision of aid. In an effort to maintain their presence and continue to deliver on their humanitarian commitments, a number of humanitarian organisations have strengthened their risk management capabilities, and they have explored innovative strategies and operational practices aimed at creating greater acceptance for their activities and increasing their access to affected populations. In response to growing concerns regarding the insecurity of aid operations and the resulting decline in humanitarian access, the present study, commissioned by the UN Office for the Coordination of Humanitarian Affairs (OCHA), set out to identify and document those strategies and practices that have enabled humanitarian organisations to maintain effective operations in contexts characterised by high security risks. In the second half of 2010 an independent research team, led by former Emergency Relief Coordinator Jan Egeland, undertook six field studies in complex security environments, conducted interviews with 255 humanitarian practitioners and policymakers, surveyed over 1,100 national staff members, and carried out a desk-based review of organisational literature and case-based evidence. This report synthesises the findings as well as specific inputs and guidance received from the study's Advisory Group."--Excerpted from Executive summary, p. 1 |
Beschreibung: | 1 Online-Ressource (xiv, 88 p.) |
ISBN: | 9210556658 9211320313 9789210556651 9789211320312 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043130977 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 151126s2011 |||| o||u| ||||||eng d | ||
020 | |a 9210556658 |c electronic bk. |9 92-1-055665-8 | ||
020 | |a 9211320313 |9 92-1-132031-3 | ||
020 | |a 9789210556651 |c electronic bk. |9 978-92-1-055665-1 | ||
020 | |a 9789211320312 |9 978-92-1-132031-2 | ||
035 | |a (OCoLC)806325730 | ||
035 | |a (DE-599)BVBBV043130977 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 |a DE-1047 | ||
082 | 0 | |a 361.2/6 |2 23 | |
100 | 1 | |a Egeland, Jan |e Verfasser |4 aut | |
245 | 1 | 0 | |a To stay and deliver |b good practice for humanitarians in complex security environments |c Jan Egeland, Adele Harmer and Abby Stoddard |
246 | 1 | 3 | |a Good practice for humanitarians in complex security environments |
264 | 1 | |a [New York, N.Y.?] |b Policy Development and Studies Branch (PDSB), UN Office for the Coordination of Humanitarian Affairs (OCHA) |c c2011 | |
300 | |a 1 Online-Ressource (xiv, 88 p.) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Policy and studies series | |
500 | |a "Independent study commissioned by the Office for the Coordination of Humanitarian Affairs (OCHA)." | ||
500 | |a Paralleltitel: Good practice for humanitarians in complex security environments | ||
500 | |a Includes bibliographical references (p. 53-58) | ||
500 | |a Authors -- Foreword -- Preface -- Acknowledgments -- Advisory Group Members -- Acronyms -- Glossary -- Executive Summary -- 1. Introduction -- 1.1. Background and aims of the study: Why humanitarian security, and why now? -- 1.2. Methodology -- 1.3. Key concepts and recent developments in humanitarian operational security -- 2. The threat environment: Challenges to secure and effective humanitarian access -- 2.1. Trends in security for humanitarian workers -- 2.2. Differentiating threat contexts -- 2.3. Intrinsic vulnerabilities of the humanitarian community -- 3. Good practice for gaining and maintaining access in high-risk environments -- 3.1. Active acceptance-based approaches -- 3.2. Negotiating access -- 3.3. Remote programming: Strategic localisation of operations, not risk transfer -- 3.4. Low-profile approaches -- 3.5. Protective measures: 'Smart protection', not bunkerisation -- 3.6. Deterrent measures: Issues around armed protection -- 3.7. Other operational means for enhancing secure access: Programming options, coordination, partnerships, and resourcing -- 4. Political constraints -- 4.1. The role of host governments -- 4.2. States, specifically donor governments -- 4.3. Non-state armed actors and the terrorist label -- 4.4. International humanitarian advocacy and negotiation -- 5. National and local humanitarian actors: Key issues -- 5.1. National perspectives on threat and risk -- 5.2. Duty of care and responsible partnership -- 5.3. Coordination and consultation -- 5.4. Principles and perceptions -- 6. Conclusions and recommendations -- Bibliography -- Annexes -- 1. Study concept note -- 2. People interviewed -- 3. Survey instrument and summary results -- 4. Legal documents | ||
500 | |a "Providing humanitarian assistance amid conflict has always been a dangerous and difficult endeavour; however, over the last decade aid worker casualties tripled, reaching over 100 deaths per year. From 2005 onwards the largest numbers of violent attacks on humanitarian personnel have been concentrated in a small number of countries representing the most difficult and volatile operating environments. Attacks in some of these settings have also grown more lethal and sophisticated and the number of kidnappings has risen dramatically. As a result, the humanitarian footprint has shrunk in some conflict areas where violence has surged in recent years, such as Afghanistan, Pakistan, and Somalia. Access can diminish both as a direct result of violence and as a consequence of the obstacles and conditions created by militaries, governments, and nonstate actors that hinder the impartial provision of aid. | ||
500 | |a In an effort to maintain their presence and continue to deliver on their humanitarian commitments, a number of humanitarian organisations have strengthened their risk management capabilities, and they have explored innovative strategies and operational practices aimed at creating greater acceptance for their activities and increasing their access to affected populations. In response to growing concerns regarding the insecurity of aid operations and the resulting decline in humanitarian access, the present study, commissioned by the UN Office for the Coordination of Humanitarian Affairs (OCHA), set out to identify and document those strategies and practices that have enabled humanitarian organisations to maintain effective operations in contexts characterised by high security risks. | ||
500 | |a In the second half of 2010 an independent research team, led by former Emergency Relief Coordinator Jan Egeland, undertook six field studies in complex security environments, conducted interviews with 255 humanitarian practitioners and policymakers, surveyed over 1,100 national staff members, and carried out a desk-based review of organisational literature and case-based evidence. This report synthesises the findings as well as specific inputs and guidance received from the study's Advisory Group."--Excerpted from Executive summary, p. 1 | ||
650 | 7 | |a POLITICAL SCIENCE / Public Policy / Social Services & Welfare |2 bisacsh | |
650 | 7 | |a SOCIAL SCIENCE / Human Services |2 bisacsh | |
650 | 4 | |a Humanitarian assistance | |
650 | 4 | |a Philanthropists |x Violence against | |
650 | 4 | |a Human security | |
650 | 4 | |a Security, International | |
650 | 4 | |a Humanitarianism | |
650 | 4 | |a International relief | |
700 | 1 | |a Harmer, Adele |e Sonstige |4 oth | |
700 | 1 | |a Stoddard, Abby |e Sonstige |4 oth | |
710 | 2 | |a United Nations |b Office for the Coordination of Humanitarian Affairs |e Sonstige |4 oth | |
856 | 4 | 0 | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=464931 |x Aggregator |3 Volltext |
912 | |a ZDB-4-EBA | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-028555168 | ||
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=464931 |l FAW01 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext | |
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=464931 |l FAW02 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext |
Datensatz im Suchindex
_version_ | 1804175570247876608 |
---|---|
any_adam_object | |
author | Egeland, Jan |
author_facet | Egeland, Jan |
author_role | aut |
author_sort | Egeland, Jan |
author_variant | j e je |
building | Verbundindex |
bvnumber | BV043130977 |
collection | ZDB-4-EBA |
ctrlnum | (OCoLC)806325730 (DE-599)BVBBV043130977 |
dewey-full | 361.2/6 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 361 - Social problems and services |
dewey-raw | 361.2/6 |
dewey-search | 361.2/6 |
dewey-sort | 3361.2 16 |
dewey-tens | 360 - Social problems and services; associations |
discipline | Soziologie |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>06577nmm a2200589zc 4500</leader><controlfield tag="001">BV043130977</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">151126s2011 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9210556658</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">92-1-055665-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9211320313</subfield><subfield code="9">92-1-132031-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9789210556651</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-92-1-055665-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9789211320312</subfield><subfield code="9">978-92-1-132031-2</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)806325730</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043130977</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield><subfield code="a">DE-1047</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">361.2/6</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Egeland, Jan</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">To stay and deliver</subfield><subfield code="b">good practice for humanitarians in complex security environments</subfield><subfield code="c">Jan Egeland, Adele Harmer and Abby Stoddard</subfield></datafield><datafield tag="246" ind1="1" ind2="3"><subfield code="a">Good practice for humanitarians in complex security environments</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">[New York, N.Y.?]</subfield><subfield code="b">Policy Development and Studies Branch (PDSB), UN Office for the Coordination of Humanitarian Affairs (OCHA)</subfield><subfield code="c">c2011</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xiv, 88 p.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Policy and studies series</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">"Independent study commissioned by the Office for the Coordination of Humanitarian Affairs (OCHA)."</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Paralleltitel: Good practice for humanitarians in complex security environments</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references (p. 53-58)</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Authors -- Foreword -- Preface -- Acknowledgments -- Advisory Group Members -- Acronyms -- Glossary -- Executive Summary -- 1. Introduction -- 1.1. Background and aims of the study: Why humanitarian security, and why now? -- 1.2. Methodology -- 1.3. Key concepts and recent developments in humanitarian operational security -- 2. The threat environment: Challenges to secure and effective humanitarian access -- 2.1. Trends in security for humanitarian workers -- 2.2. Differentiating threat contexts -- 2.3. Intrinsic vulnerabilities of the humanitarian community -- 3. Good practice for gaining and maintaining access in high-risk environments -- 3.1. Active acceptance-based approaches -- 3.2. Negotiating access -- 3.3. Remote programming: Strategic localisation of operations, not risk transfer -- 3.4. Low-profile approaches -- 3.5. Protective measures: 'Smart protection', not bunkerisation -- 3.6. Deterrent measures: Issues around armed protection -- 3.7. Other operational means for enhancing secure access: Programming options, coordination, partnerships, and resourcing -- 4. Political constraints -- 4.1. The role of host governments -- 4.2. States, specifically donor governments -- 4.3. Non-state armed actors and the terrorist label -- 4.4. International humanitarian advocacy and negotiation -- 5. National and local humanitarian actors: Key issues -- 5.1. National perspectives on threat and risk -- 5.2. Duty of care and responsible partnership -- 5.3. Coordination and consultation -- 5.4. Principles and perceptions -- 6. Conclusions and recommendations -- Bibliography -- Annexes -- 1. Study concept note -- 2. People interviewed -- 3. Survey instrument and summary results -- 4. Legal documents</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">"Providing humanitarian assistance amid conflict has always been a dangerous and difficult endeavour; however, over the last decade aid worker casualties tripled, reaching over 100 deaths per year. From 2005 onwards the largest numbers of violent attacks on humanitarian personnel have been concentrated in a small number of countries representing the most difficult and volatile operating environments. Attacks in some of these settings have also grown more lethal and sophisticated and the number of kidnappings has risen dramatically. As a result, the humanitarian footprint has shrunk in some conflict areas where violence has surged in recent years, such as Afghanistan, Pakistan, and Somalia. Access can diminish both as a direct result of violence and as a consequence of the obstacles and conditions created by militaries, governments, and nonstate actors that hinder the impartial provision of aid. </subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">In an effort to maintain their presence and continue to deliver on their humanitarian commitments, a number of humanitarian organisations have strengthened their risk management capabilities, and they have explored innovative strategies and operational practices aimed at creating greater acceptance for their activities and increasing their access to affected populations. In response to growing concerns regarding the insecurity of aid operations and the resulting decline in humanitarian access, the present study, commissioned by the UN Office for the Coordination of Humanitarian Affairs (OCHA), set out to identify and document those strategies and practices that have enabled humanitarian organisations to maintain effective operations in contexts characterised by high security risks. </subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a"> In the second half of 2010 an independent research team, led by former Emergency Relief Coordinator Jan Egeland, undertook six field studies in complex security environments, conducted interviews with 255 humanitarian practitioners and policymakers, surveyed over 1,100 national staff members, and carried out a desk-based review of organisational literature and case-based evidence. This report synthesises the findings as well as specific inputs and guidance received from the study's Advisory Group."--Excerpted from Executive summary, p. 1</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">POLITICAL SCIENCE / Public Policy / Social Services & Welfare</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">SOCIAL SCIENCE / Human Services</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Humanitarian assistance</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Philanthropists</subfield><subfield code="x">Violence against</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Human security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Security, International</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Humanitarianism</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">International relief</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Harmer, Adele</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Stoddard, Abby</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">United Nations</subfield><subfield code="b">Office for the Coordination of Humanitarian Affairs</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=464931</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028555168</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=464931</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=464931</subfield><subfield code="l">FAW02</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV043130977 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:18:23Z |
institution | BVB |
isbn | 9210556658 9211320313 9789210556651 9789211320312 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028555168 |
oclc_num | 806325730 |
open_access_boolean | |
owner | DE-1046 DE-1047 |
owner_facet | DE-1046 DE-1047 |
physical | 1 Online-Ressource (xiv, 88 p.) |
psigel | ZDB-4-EBA ZDB-4-EBA FAW_PDA_EBA |
publishDate | 2011 |
publishDateSearch | 2011 |
publishDateSort | 2011 |
publisher | Policy Development and Studies Branch (PDSB), UN Office for the Coordination of Humanitarian Affairs (OCHA) |
record_format | marc |
series2 | Policy and studies series |
spelling | Egeland, Jan Verfasser aut To stay and deliver good practice for humanitarians in complex security environments Jan Egeland, Adele Harmer and Abby Stoddard Good practice for humanitarians in complex security environments [New York, N.Y.?] Policy Development and Studies Branch (PDSB), UN Office for the Coordination of Humanitarian Affairs (OCHA) c2011 1 Online-Ressource (xiv, 88 p.) txt rdacontent c rdamedia cr rdacarrier Policy and studies series "Independent study commissioned by the Office for the Coordination of Humanitarian Affairs (OCHA)." Paralleltitel: Good practice for humanitarians in complex security environments Includes bibliographical references (p. 53-58) Authors -- Foreword -- Preface -- Acknowledgments -- Advisory Group Members -- Acronyms -- Glossary -- Executive Summary -- 1. Introduction -- 1.1. Background and aims of the study: Why humanitarian security, and why now? -- 1.2. Methodology -- 1.3. Key concepts and recent developments in humanitarian operational security -- 2. The threat environment: Challenges to secure and effective humanitarian access -- 2.1. Trends in security for humanitarian workers -- 2.2. Differentiating threat contexts -- 2.3. Intrinsic vulnerabilities of the humanitarian community -- 3. Good practice for gaining and maintaining access in high-risk environments -- 3.1. Active acceptance-based approaches -- 3.2. Negotiating access -- 3.3. Remote programming: Strategic localisation of operations, not risk transfer -- 3.4. Low-profile approaches -- 3.5. Protective measures: 'Smart protection', not bunkerisation -- 3.6. Deterrent measures: Issues around armed protection -- 3.7. Other operational means for enhancing secure access: Programming options, coordination, partnerships, and resourcing -- 4. Political constraints -- 4.1. The role of host governments -- 4.2. States, specifically donor governments -- 4.3. Non-state armed actors and the terrorist label -- 4.4. International humanitarian advocacy and negotiation -- 5. National and local humanitarian actors: Key issues -- 5.1. National perspectives on threat and risk -- 5.2. Duty of care and responsible partnership -- 5.3. Coordination and consultation -- 5.4. Principles and perceptions -- 6. Conclusions and recommendations -- Bibliography -- Annexes -- 1. Study concept note -- 2. People interviewed -- 3. Survey instrument and summary results -- 4. Legal documents "Providing humanitarian assistance amid conflict has always been a dangerous and difficult endeavour; however, over the last decade aid worker casualties tripled, reaching over 100 deaths per year. From 2005 onwards the largest numbers of violent attacks on humanitarian personnel have been concentrated in a small number of countries representing the most difficult and volatile operating environments. Attacks in some of these settings have also grown more lethal and sophisticated and the number of kidnappings has risen dramatically. As a result, the humanitarian footprint has shrunk in some conflict areas where violence has surged in recent years, such as Afghanistan, Pakistan, and Somalia. Access can diminish both as a direct result of violence and as a consequence of the obstacles and conditions created by militaries, governments, and nonstate actors that hinder the impartial provision of aid. In an effort to maintain their presence and continue to deliver on their humanitarian commitments, a number of humanitarian organisations have strengthened their risk management capabilities, and they have explored innovative strategies and operational practices aimed at creating greater acceptance for their activities and increasing their access to affected populations. In response to growing concerns regarding the insecurity of aid operations and the resulting decline in humanitarian access, the present study, commissioned by the UN Office for the Coordination of Humanitarian Affairs (OCHA), set out to identify and document those strategies and practices that have enabled humanitarian organisations to maintain effective operations in contexts characterised by high security risks. In the second half of 2010 an independent research team, led by former Emergency Relief Coordinator Jan Egeland, undertook six field studies in complex security environments, conducted interviews with 255 humanitarian practitioners and policymakers, surveyed over 1,100 national staff members, and carried out a desk-based review of organisational literature and case-based evidence. This report synthesises the findings as well as specific inputs and guidance received from the study's Advisory Group."--Excerpted from Executive summary, p. 1 POLITICAL SCIENCE / Public Policy / Social Services & Welfare bisacsh SOCIAL SCIENCE / Human Services bisacsh Humanitarian assistance Philanthropists Violence against Human security Security, International Humanitarianism International relief Harmer, Adele Sonstige oth Stoddard, Abby Sonstige oth United Nations Office for the Coordination of Humanitarian Affairs Sonstige oth http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=464931 Aggregator Volltext |
spellingShingle | Egeland, Jan To stay and deliver good practice for humanitarians in complex security environments POLITICAL SCIENCE / Public Policy / Social Services & Welfare bisacsh SOCIAL SCIENCE / Human Services bisacsh Humanitarian assistance Philanthropists Violence against Human security Security, International Humanitarianism International relief |
title | To stay and deliver good practice for humanitarians in complex security environments |
title_alt | Good practice for humanitarians in complex security environments |
title_auth | To stay and deliver good practice for humanitarians in complex security environments |
title_exact_search | To stay and deliver good practice for humanitarians in complex security environments |
title_full | To stay and deliver good practice for humanitarians in complex security environments Jan Egeland, Adele Harmer and Abby Stoddard |
title_fullStr | To stay and deliver good practice for humanitarians in complex security environments Jan Egeland, Adele Harmer and Abby Stoddard |
title_full_unstemmed | To stay and deliver good practice for humanitarians in complex security environments Jan Egeland, Adele Harmer and Abby Stoddard |
title_short | To stay and deliver |
title_sort | to stay and deliver good practice for humanitarians in complex security environments |
title_sub | good practice for humanitarians in complex security environments |
topic | POLITICAL SCIENCE / Public Policy / Social Services & Welfare bisacsh SOCIAL SCIENCE / Human Services bisacsh Humanitarian assistance Philanthropists Violence against Human security Security, International Humanitarianism International relief |
topic_facet | POLITICAL SCIENCE / Public Policy / Social Services & Welfare SOCIAL SCIENCE / Human Services Humanitarian assistance Philanthropists Violence against Human security Security, International Humanitarianism International relief |
url | http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=464931 |
work_keys_str_mv | AT egelandjan tostayanddelivergoodpracticeforhumanitariansincomplexsecurityenvironments AT harmeradele tostayanddelivergoodpracticeforhumanitariansincomplexsecurityenvironments AT stoddardabby tostayanddelivergoodpracticeforhumanitariansincomplexsecurityenvironments AT unitednationsofficeforthecoordinationofhumanitarianaffairs tostayanddelivergoodpracticeforhumanitariansincomplexsecurityenvironments AT egelandjan goodpracticeforhumanitariansincomplexsecurityenvironments AT harmeradele goodpracticeforhumanitariansincomplexsecurityenvironments AT stoddardabby goodpracticeforhumanitariansincomplexsecurityenvironments AT unitednationsofficeforthecoordinationofhumanitarianaffairs goodpracticeforhumanitariansincomplexsecurityenvironments |