Document details

Communications, Technology and Humanitarian Delivery: Challenges and Opportunities for Security Risk Management

European Interagency Security Forum (EISF) (2014), 68 pp.
"The articles contained in this publication are dispatches from a new frontline in humanitarian action: the digital frontier. All are written by those observing, experiencing and attempting to respond to the challenges created by the digital revolution and the very real threats it is creating for humanitarian operations, and exploring the potential of new tools to create a safer, more responsive operational environment for aid workers." (Page 5)
Introduction / Raquel Vazquez Llorente and Imogen Wall, 4
SECTION I: UNDERSTANDING THE OPERATIONAL ENVIRONMENT
1 Cyber-Warfare and Humanitarian Space / Daniel Gilman, 8
2 Trends in Intelligence Gathering by Governments / Rory Byrne, 12
3 The Dichotomy of Technology in Conflict: Beauty and the Beast / Anahi Ayala, 17
4 Conjuring Zones of Insecurity: Post-Conflict Election Campaigning by Text Message in Aceh, Indonesia / Jesse Hession Grayman and Bobby Anderson, 22
5 Monitoring Online Dangerous Speech in Kenya: Insights from the Umati Project / Nanjira Sambuli and Kagonya Awori, 27
SECTION II: COMMUNICATIONS TECHNOLOGY AND ITS IMPACT ON HUMANITARIAN PROGRAMMES
6 Whispering When Everyone Is Listening: Low-Tech Communications Technology Implementations in High-Risk Contexts / Keith Porcaro and Laura Walker Hudson, 33
7 A Principled Approach to Data Management: Lessons Learned from Medair's Experience in Lebanon Using Last Mile Mobile Solutions / Joel Kaiser and Rob Fielding, 37
8 Mobile Money Systems for Humanitarian Delivery: World Vision Cash Transfer Project in Gihembe Refugee Camp, Rwanda / Maereg Tafere, Stuart Katkiwirize, Esther Kamau and Jules Nsabimana, 42
SECTION III: USING COMMUNICATIONS TECHNOLOGY FOR SECURITY RISK MANAGEMENT
9 SMS Technology and Bulk SMS Delivery Systems: Their Role in Security Management for the Humanitarian Community / Athalie Mayo, 46
10 Applicability of Open Source Systems (Ushahidi) for Security Management, Incident and Crisis Mapping: Acción contra el Hambre (ACF- Spain) Case Study / Gonzalo de Palacios, 51
11 Measures for Mitigating Cyber-Security Risks / Rory Byrne, 56