Practices and consequences of using humanitarian technologies in volatile aid settings

Jori Pascal Kalkman1
1Department of Organization Sciences, VU University, De Boelelaan 1105, 1081HV, Amsterdam, The Netherlands

Tóm tắt

Từ khóa


Tài liệu tham khảo

Abdelnour S, Saeed AM (2014) Technologizing humanitarian space: Darfur advocacy and the rape-stove panacea. Int Political Sociol 8:145–163

Abild E (2010) Creating humanitarian space: a case study of Somalia. Refug Surv Q 29:67–102

Andersson R, Weigand F (2015) Intervention at risk: the vicious cycle of distance and danger in Mali and Afghanistan. J Interv Statehood 9(4):519–541

Beck U (1992) Risk society: towards a new modernity. Sage Publications, London

Beck U (2006) Living in the world risk society. Econ Soc 35:329–345

Byrne R (2016) Trends in intelligence gathering by governments. In: Vazquez Llorente R, Wall I (eds.) Communications technology and humanitarian delivery: challenges and opportunities for security risk management. European Interagency Security Forum (EISF)

Canter DV, Sarangi S (2009) The rhetorical foundation of militant jihad. In: Canter DV (ed) Faces of terrorism: multidisciplinary perspectives. Wiley-Blackwell, Chihester

Carle A, Chkam H (2006) Humanitarian action in the new security environment: policy and operational implications in Iraq. HPG background paper, London

Cater J (2011) Skype: a cost effective method for qualitative research. Rehabilitation Couns Educ J 4(2):3–4

Collinson S, Duffield M (2013) Paradoxes of presence: risk management and aid culture in challenging environments. Humanitarian Policy Group, London

Cunningham AJ (2017) Kidnapping and the limits of acceptance. J Int Humanit Action 2:4

De Palacios G (2016) Applicability of open source systems (Ushahidi) for security management, incident and crisis mapping: Accion contra el Hambre (ACF-Spain) case study. In: Vazquez Llorente R, Wall I (eds.) Communications technology and humanitarian delivery: challenges and opportunities for security risk management. European Interagency Security Forum (EISF)

Deakin H, Wakefield K (2014) Skype interviewing: reflections of two PhD researchers. Qual Res 14(5):603–616

Donini A, Maxwell D (2013) From face-to-face to face-to-screen: implications of Remote Management for the effectiveness and accountability of humanitarian action in insecure environments. Int Rev Red Cross 95(890):384–413

Duffield M (2010) Risk-management and the fortified aid compound: everyday life in post-interventionary society. J Interv Statehood 4(4):453–474

Duffield M (2012) Challenging environments: danger, resilience and the aid industry. Secur Dialogue 43:475–492

Duffield M (2013) Disaster-resilience in the network age access-denial and the rise of cyber-humanitarianism. DIIS Working Paper 2013:23

Duffield M (2014) From immersion to simulation: remote methodologies and the decline of area studies. Rev Afr Polit Econ 41(sup 1):S75–S94

Duffield M (2016) The resilience of the ruins: towards a critique of digital humanitarianism. Resilience 4(3):147–165

Egeland J, Harmer A, Stoddard A (2011) To stay and deliver. Good practice for humanitarians in complex security environments. OCHA: Policy and Studies Series

Fast LA (2010) Mind the gap: documenting and explaining violence against aid workers. European J Int Relat 16:365–389

Fast LA, Freeman CF, O’Neill M, Rowley E (2013) In acceptance we trust? Conceptualising acceptance as a viable approach to NGO security management. Disasters 37(2):222–243

Fuji LA (2009) Interpreting truth and lies in stories of conflict and violence. In: Sriram CL, King JC, Mertus JA, Martin-Ortega O, Herman J (eds.) Surviving Field Research: working in violent and difficult situations. Routledge, New York.

Gonsalves A (2016) Applying serious gaming to humanitarian security: a framework for mixed-reality training. In: Vazquez Llorente R, Wall I (eds.) Communications technology and humanitarian delivery: challenges and opportunities for security risk management. European Interagency Security Forum (EISF)

Gundel J (2006) Humanitarian action in the new security environment: policy and operational implications in Somalia and Somaliland. HPG Background Paper

Hilhorst D, Jansen BJ (2010) Humanitarian space as arena: a perspective on the everyday politics of aid. Dev Chang 41(6):1117–1139

HPN (2010) Operational security management in violent environments. Good practice review: number 8. Humanitarian Practice Network, London

IFRC (2013) World disaster report 2013, focus on technology and the future of humanitarian action. International Foundation of the Red Cross and Red Crescent, Geneva

Jacobsen KL (2015) The politics of humanitarian technology: good intentions, unintended consequences and insecurity. Routledge, New York

Janghorban R, Roudsari RL, Taghipour A (2014) Skype interviewing: the new generation of online synchronous interview in qualitative research. Int J Qual Stud Health Well-Being 9:1

Karlsrud J, Rosén F (2013) In the eye of the beholder? UN and the use of drones to protect civilians. Stab Int J Sec Dev 2:2

Mayo A (2016) SMS technology and bulk SMS delivery systems: their role in security management for the humanitarian community. In: Vazquez Llorente R, Wall I (eds.) Communications technology and humanitarian delivery: challenges and opportunities for security risk management. European Interagency Security Forum (EISF)

Meier P (2011) New information technologies and their impact on the humanitarian sector. Int. Rev Red Cross 93(884):1239–1263

Miles MB, Huberman AM, Saldaña J (2013) Qualitative data analysis: a methods sourcebook, 3rd edn. Sage Publications, London

Powell C (2001) Remarks to the National Foreign Policy Conference for leaders of nongovernmental organizations. http://avalon.law.yale.edu/sept11/powell_brief31.asp . Accessed 27 Sept 2017.

Qadir J, Ali A, ru Rasool R, Zwitter A, Sathiaseelan A, Crowcroft J (2016) Crisis analytics: big data-driven crisis response. J Int Humanit Action 1:12

Sandstrom K (2014) Remoteness and ‘demonitored space’ in Afghanistan. Peacebuilding 2(3):286-302. Sage Publications, London

Sandvik KB (2016) The humanitarian cyberspace: shrinking space or an expanding frontier? Third World Q 37(1):17–32

Sandvik KB (2017) Now is the time to deliver: looking for humanitarian innovation’s theory of change. J Int Humanit Action 2:8

Sandvik KB, Jumbert MG, Karlsrud J, Kaufmann M (2014) Humanitarian technology: a critical research agenda. Int Rev Red Cross 96(893):219–242

Sandvik KB, Lohne K (2014) The rise of the humanitarian drone: giving content to an emerging concept. Millennium: J Int Stud 43(1):145-164

Schneiker A (2013) The vulnerable do-gooders: security strategies of German aid agencies. Disasters 37(2):244–266

Sheik M, Gutierrez MI, Bolton P, Spiegel P, Thieren M, Burnham G (2000) Deaths among humanitarian workers. Br Med J 321:166–168

Simpson J (2015) Risk management responses to armed non-state actor risk in Afghanistan. Int Rev Soc Res 5(3):156–166

Steets J, Reichhold U, Sagmeister E (2012) Evaluation and review of humanitarian access strategies in DG ECHO funded interventions. Global Public Policy Institute: ECHO report

Stoddard A, Harmer A, Czwarno M (2017) Aid Worker Security Report 2017: Behind the attacks: a look at the perpetrators of violence against aid workers. Humanitarian Outcomes

Stoddard A, Harmer A, V DiDomenico (2009) Providing aid in insecure environments: 2009 update trends in violence against aid workers and the operational response. HPG Policy Brief 34

Stoddard A, Harmer A, Renouf JS (2010). Once removed: lessons and challenges in remote management of humanitarian operations for insecure areas. Humanitarian Outcomes

UNOCHA (2013) Humanitarianism in the network age. United Nations, New York

van der Windt P, Humphreys M (2016) Crowdseeding conflict data. J Confl Resolut 60(4):748–781

Vazquez Llorente R, Wall I (eds.) (2016) Communications technology and humanitarian delivery: challenges and opportunities for security risk management. European Interagency Security Forum (EISF)

Vitaliev D (2009) Cyber security for international aid agencies: a primer. SMI Professional Development Brief 3