GIZ Algorithm for Post-Assault Management in the Field (Members only content)
This algorithm was produced by Humanitrain for GIZ to support its post-assault incident management.
From research papers to training packs, find the resources you need, all in one place. For GISF members, please log in to access member-only resources. For hard copies of any GISF resources, please contact research@gisf.ngo. If you would like to share a resource with GISF, please contact tolani@gisf.ngo.
This algorithm was produced by Humanitrain for GIZ to support its post-assault incident management.
In the fourth GISF in Conversation podcast, we spoke to two humanitarians working in Iraq: Craige Grice, an NRC Security Adviser, and Salah Noori, an NRC Programme Adviser. They discuss the significance of security risk management in accessing those in…
Abduction and Kidnap Risk Management provides a concise summary of key information for non-governmental organisations facing the threat of a potential or actual abduction of one of their staff members or other individuals under their responsibility, for example, consultants or volunteers. Abductions…
The presentations and notes from the GISF Forum in London on the 5th and 6th October 2017 are now available for members to view. The notes and slides for each session can be found under the corresponding heading on the…
In the third episode of the GISF in Conversation podcast series, Heather Hughes, Oxfam GB’s Global Security Advisor, speaks about what security risk management means to her organisation. She highlights the benefits and importance of security risk management and challenges perception…
This document contains an example NGO security policy.
This document contains an example administrative order pertaining to security management for individuals visiting NGO projects or staying in project locations but who are not employed by the NGO itself.
In this episode of the EISF in Conversation podcast series, we sat down with Eva Svoboda, a Senior Research Fellow at the Overseas Development Institute, to discuss the humanitarian principles and how they relate to security risk management. Eva speaks about the…
This paper by Christie Ulicny (2017) provides a review of effective smart practices in security risk management and recommendations that would support the improvement of the World University Service of Canada’s (WUSC) security risk management plan. The secondary intention of…
This report (2017) combines the latest statistics on major attacks on humanitarian aid workers from the Aid Worker Security Database (AWSD) and interviews with members of armed groups to shed light on the motivations behind attacks on humanitarian workers by…