Load low-bandwidth site?

CME Injects


Security risk management. NGO approach

This paper, prepared by InterActions’s Security Advisory Group, describes its recommended security risk management process.

The Birth of the Islamic State 2006-2014

This chronogram charts the rise of ISIS from 2006 up until 2014

Protecting Humanitarian Action: Key Challenges and Lessons from the Field

This paper presents an overview of key challenges and dilemmas faced in the protection of humanitarian action and aims to provide an initial overview of the legal, policy, and operational trends and issues identified by ATHA through its ongoing research and discussions with practitioners.