Load low-bandwidth site?
Help

Published: April 29, 2014

Communications technology and humanitarian delivery: challenges and opportunities for security risk management

Share this:

The European Inter Agency Security Forum (EISF) is pleased to announce a new publication presenting discussion papers which will look at how communications technology is creating new security risk management challenges and opportunities for agencies working in humanitarian response. The publication will present information on current technologies and their use in security risk management; explore the impact on security of both humanitarian actors and affected communities; analyse the ways in which technologies are influencing how humanitarians operate and their security; and generate debate on how communications technology can contribute to risk management.

EISF is therefore seeking abstracts for short papers to be included in the final publication that explores this field. Case studies and proposals based on current field research or experience are encouraged. All accepted papers will be published collectively in a single report to be publicly launched by GISF in September 2014.

Please note the deadline for abstract submission is May 22nd.

Themes for abstracts

Data management and security risk management

• Aid agencies and technical vulnerability
• Working with big data: challenges and opportunities
• Intelligence and information gathering
• Data security: lessons from the private sector
• Trends in intelligence gathering by governments
• Social media and data verification

Communications technology, programme delivery and security risk management

• Communications technology and connecting with affected communities (perceptions and strategies for acceptance)
• Use of technology by affected communities
• Security issues in digital cash transfer programming
• Communications technology and changes in programming approaches
• Communications technology, security and remote management
• Communications technology and reputation management
• Communications technology and staff welfare (including local staff)

Communications technology in conflict environments

• Analysis of country case studies (Syria research especially welcome)
• Use of communications technology by parties to conflict
• Hate speech (especially Kenya and Myanmar)
• Protection of affected communities in conflict: opportunities and challenges created by communications technology

 

Submission Guidelines

• Abstracts of 150-300 words can be submitted via eisf.paper.series@gmail.com

The deadline for abstract submissions is May 22nd. Authors of abstracts selected will be notified by June 2nd. Final papers are due by July 11th. Final papers should be no more than 2,500 words.

• Abstracts must be submitted in English and include an overview of the proposed topic and argument/angle presented. Joint submissions and multiple abstract submissions are welcomed, although in the second case only one abstract per author will be accepted. If possible, please send multiple abstracts together.

• Please include also a basic biography including your current affiliation/post. Biographies are limited to 100 words. Your biography should be written using complete sentences (please refrain from using bullet points). Please include contact details and indicate whether you wish these to be published.

• Abstracts should be prepared and submitted as Word documents with 1.0 line spacing. Use limited references (e.g. Smith 1999), only if necessary.

• If you have entered a valid email address you will receive a confirmation email confirming receipt of your submission.

 

Terms and Conditions

In submitting an abstract all authors agree to the following terms and conditions:

• I confirm that each author listed agrees with the content of this abstract and has given permission to be listed as an author.

• I have checked the accuracy of the information and referencing within this abstract.

 

Related:

New technologies and data protection: are humanitarian organisations ready to face security threats of the 21st century?

The increasing use of electronic data by the aid industry and growing fears about data protection emphasise the lack of clear rules for data management. In the years ahead, more will need to be done to appease fears around data protection. However, if rules and adequate security measures are established,…

2014

The role of international aid agencies in protecting national humanitarian staff

GISF Researcher Raquel Vazquez Llorente writes for the Harvard University Advanced Training Program on Humanitarian Action (ATHA). In her post, Raquel explores the increased reliance on local partners to deliver aid in high risk emergencies and the role that international NGOs play in protecting national humanitarian staff.

2015

Somalia: latest security incidents

Some analysts looked at the 2012 elections in Somalia as a possible turning point for the country, and the first months afterwards saw a renewed sense of optimism. Unfortunately, that possibility has yet to materialise and the country continues to be plagued by security concerns. In fact, the UN has…

2014