Load low-bandwidth site?
Help

Glossary English

The Global Interagency Security Forum (GISF) developed this Glossary to facilitate a common understanding of terms frequently used in security risk management.

The terms and definitions have been drawn from a range of trusted resources, including GISF’s own publications. They have also been informed by a working group of GISF members.

The GISF Glossary is available in four languages: English, French, Spanish and Arabic. The site has been designed to enable easy navigation between terms in each language, supporting more consistent and accurate communication across language barriers.

The GISF Glossary is reviewed and updated regularly, to reflect new terms and changing definitions within the security risk management sector. If you have a term you would like to add to the Glossary or a suggested amendment, please contact us through our feedback form.

A

abandoned explosive ordnance (AXO)

Any type of explosive weapon, such as bombs, shells, grenades, landmines, or munitions that has been left behind and is no longer under military control. These ordnances can remain hazardous long after the conflict has ended.
Show translations

abuse

A deliberate act with actual or potential negative effects upon a person’s safety, wellbeing, dignity, and development. It usually takes place in the context of a relationship of authority, responsibility, trust, or power.
Related terms: abuse of power , harassment
Show translations
Hide translations

acceptance approach

An approach to security risk management that attempts to negate a threat through building relationships with local communities and relevant stakeholders in the operational area and obtaining their acceptance and consent for the organisation’s presence and its work. In security risk management, acceptance involves recognising certain risks and choosing to tolerate them when the cost of prevention is too high compared to the potential impact. It complements protection, which focuses on safeguarding assets through defensive measures, and deterrence, which aims to discourage threats by making the consequences of an attack clear. Together, these strategies form a balanced approach to managing security risks efficiently and effectively.
Show translations

acceptance strategy

A security risk management strategy that involves building positive relationships and cultivating and maintaining consent from communities, local authorities, armed groups, and other key stakeholders. An acceptance strategy seeks to reduce or remove threats by developing and maintaining widespread acceptance for the organisation’s presence and activities by stakeholders.
Show translations

actor mapping

An exercise to identify key actors/stakeholders in a given environment that will have an effect on your organisation’s programmes and the operating environment. Actor mapping can help to determine how different actors/stakeholders positively or negatively impact the security environment and risks to the organisation, its staff, and its activities.
Show translations

after action review (AAR)

An assessment conducted to evaluate the decisions and actions that were made during the response to a crisis or incident. AARs are usually conducted after the crisis response phase is complete. An AAR can help to identify lessons learned and address concerns about how things were handled. While this is a valuable process, it should be done to inform future planning and decisions.
Show translations

aftercare

The provision of psychosocial, ongoing medical, and practical support after an incident (for example, medical treatment, mental health support, additional paid leave). Aftercare is provided to victims, staff involved, their family, and others who may have been affected by the incident or involved in the crisis response.
Show translations

aid workers

Employees and associated personnel of aid groups (local, national, and international) that provide material and/or technical assistance in humanitarian contexts. This includes both emergency relief and multi-mandated (relief and development) organisations: NGOs, the International Movement of the Red Cross/Red Crescent, donor agencies and all the UN agencies belonging to the Inter-Agency Standing Committee on Humanitarian Affairs (IASC) as well as UNRWA.
Show translations

armed activity

Actions involving the use of weapons, often carried out by military, paramilitary, law enforcement or insurgent and criminal groups. In the context of security risk management, armed activity includes a variety of potential risks and scenarios, including terrorist attacks, armed robbery, political violence and civil unrest.
Show translations

armed rebellion

An organised, violent uprising by a group or faction against a government or ruling authority. These rebellions are often motivated by political, social, or economic grievances and can pose significant risks to security and safety in the affected regions.
Related terms: armed activity , mutiny
Show translations

arrest

The detention and seizure of an individual or group by a formal authority (police or military) in connection with a crime, offence, or infraction and where the person is not free to leave. For an arrest to be lawful, the arresting party must hold the power of arrest and the arrest must be carried out according to the law.
Related terms: detention
Show translations
Hide translations

attack

An act aimed at an organisation, its staff and/or programmes with the intention to cause damage, harm, injury, or death. Attacks are often manifested as violent physical acts targeting a person or persons. However, they can also be manifested in the digital space, with both direct attacks (e.g. computer viruses) and indirect attacks (e.g. phishing emails) that seek to damage or harm an organisation and its staff.
Related terms: beating
Show translations
Hide translations