Load low-bandwidth site?
Help

Published: April 29, 2014

Communications technology and humanitarian delivery: challenges and opportunities for security risk management

Share this:

The European Inter Agency Security Forum (EISF) is pleased to announce a new publication presenting discussion papers which will look at how communications technology is creating new security risk management challenges and opportunities for agencies working in humanitarian response. The publication will present information on current technologies and their use in security risk management; explore the impact on security of both humanitarian actors and affected communities; analyse the ways in which technologies are influencing how humanitarians operate and their security; and generate debate on how communications technology can contribute to risk management.

EISF is therefore seeking abstracts for short papers to be included in the final publication that explores this field. Case studies and proposals based on current field research or experience are encouraged. All accepted papers will be published collectively in a single report to be publicly launched by GISF in September 2014.

Please note the deadline for abstract submission is May 22nd.

Themes for abstracts

Data management and security risk management

• Aid agencies and technical vulnerability
• Working with big data: challenges and opportunities
• Intelligence and information gathering
• Data security: lessons from the private sector
• Trends in intelligence gathering by governments
• Social media and data verification

Communications technology, programme delivery and security risk management

• Communications technology and connecting with affected communities (perceptions and strategies for acceptance)
• Use of technology by affected communities
• Security issues in digital cash transfer programming
• Communications technology and changes in programming approaches
• Communications technology, security and remote management
• Communications technology and reputation management
• Communications technology and staff welfare (including local staff)

Communications technology in conflict environments

• Analysis of country case studies (Syria research especially welcome)
• Use of communications technology by parties to conflict
• Hate speech (especially Kenya and Myanmar)
• Protection of affected communities in conflict: opportunities and challenges created by communications technology

 

Submission Guidelines

• Abstracts of 150-300 words can be submitted via eisf.paper.series@gmail.com

The deadline for abstract submissions is May 22nd. Authors of abstracts selected will be notified by June 2nd. Final papers are due by July 11th. Final papers should be no more than 2,500 words.

• Abstracts must be submitted in English and include an overview of the proposed topic and argument/angle presented. Joint submissions and multiple abstract submissions are welcomed, although in the second case only one abstract per author will be accepted. If possible, please send multiple abstracts together.

• Please include also a basic biography including your current affiliation/post. Biographies are limited to 100 words. Your biography should be written using complete sentences (please refrain from using bullet points). Please include contact details and indicate whether you wish these to be published.

• Abstracts should be prepared and submitted as Word documents with 1.0 line spacing. Use limited references (e.g. Smith 1999), only if necessary.

• If you have entered a valid email address you will receive a confirmation email confirming receipt of your submission.

 

Terms and Conditions

In submitting an abstract all authors agree to the following terms and conditions:

• I confirm that each author listed agrees with the content of this abstract and has given permission to be listed as an author.

• I have checked the accuracy of the information and referencing within this abstract.

 

Related:

Security risk management for humanitarian operations and open-source social media platforms

In recent years, most humanitarian organisations have established a strong online presence, using social media platforms for information sharing, awareness-raising, and civil mobilisation. Until recently, however, the use of e-tools for programming purposes has been of a fairly ad hoc, reactive nature. There are growing concerns in the humanitarian sector…

2014

Living in a Taliban-controlled Afghanistan as a Female Afghan Aid Worker

For weeks, the world has been closely following the unfolding events in Afghanistan. While the Taliban took control in province after province, and we watched tragic scenes from Kabul airport where governments scrambled to evacuate their citizens and some of those who they’d promised to take with them, questions about the future of Afghan women have crystallised. To what extent will they be allowed to participate in the new Islamic Emirate? And what risks will those face who’ve been advocating for women’s rights and education?

Asia, Global 2021

The Big Picture: geopolitical trends driving humanitarian security challenges (Part 2)

Humanitarian space is constantly being negotiated, and today's security managers are having to make ethical considerations as they work to keep aid workers safe. In part two of this blog series, based on Hugo Slim's keynote speech at the 2021 HNPW session: 'SRM in the Changing Global and Humanitarian Context', Slim explores the evolution of the humanitarian footprint, and the ethics of security risk management.

All 2022