Practices and consequences of using humanitarian technologies in volatile aid settings
Tóm tắt
Từ khóa
Tài liệu tham khảo
Abdelnour S, Saeed AM (2014) Technologizing humanitarian space: Darfur advocacy and the rape-stove panacea. Int Political Sociol 8:145–163
Andersson R, Weigand F (2015) Intervention at risk: the vicious cycle of distance and danger in Mali and Afghanistan. J Interv Statehood 9(4):519–541
Beck U (1992) Risk society: towards a new modernity. Sage Publications, London
Byrne R (2016) Trends in intelligence gathering by governments. In: Vazquez Llorente R, Wall I (eds.) Communications technology and humanitarian delivery: challenges and opportunities for security risk management. European Interagency Security Forum (EISF)
Canter DV, Sarangi S (2009) The rhetorical foundation of militant jihad. In: Canter DV (ed) Faces of terrorism: multidisciplinary perspectives. Wiley-Blackwell, Chihester
Carle A, Chkam H (2006) Humanitarian action in the new security environment: policy and operational implications in Iraq. HPG background paper, London
Cater J (2011) Skype: a cost effective method for qualitative research. Rehabilitation Couns Educ J 4(2):3–4
Collinson S, Duffield M (2013) Paradoxes of presence: risk management and aid culture in challenging environments. Humanitarian Policy Group, London
De Palacios G (2016) Applicability of open source systems (Ushahidi) for security management, incident and crisis mapping: Accion contra el Hambre (ACF-Spain) case study. In: Vazquez Llorente R, Wall I (eds.) Communications technology and humanitarian delivery: challenges and opportunities for security risk management. European Interagency Security Forum (EISF)
Deakin H, Wakefield K (2014) Skype interviewing: reflections of two PhD researchers. Qual Res 14(5):603–616
Donini A, Maxwell D (2013) From face-to-face to face-to-screen: implications of Remote Management for the effectiveness and accountability of humanitarian action in insecure environments. Int Rev Red Cross 95(890):384–413
Duffield M (2010) Risk-management and the fortified aid compound: everyday life in post-interventionary society. J Interv Statehood 4(4):453–474
Duffield M (2012) Challenging environments: danger, resilience and the aid industry. Secur Dialogue 43:475–492
Duffield M (2013) Disaster-resilience in the network age access-denial and the rise of cyber-humanitarianism. DIIS Working Paper 2013:23
Duffield M (2014) From immersion to simulation: remote methodologies and the decline of area studies. Rev Afr Polit Econ 41(sup 1):S75–S94
Duffield M (2016) The resilience of the ruins: towards a critique of digital humanitarianism. Resilience 4(3):147–165
Egeland J, Harmer A, Stoddard A (2011) To stay and deliver. Good practice for humanitarians in complex security environments. OCHA: Policy and Studies Series
Fast LA (2010) Mind the gap: documenting and explaining violence against aid workers. European J Int Relat 16:365–389
Fast LA, Freeman CF, O’Neill M, Rowley E (2013) In acceptance we trust? Conceptualising acceptance as a viable approach to NGO security management. Disasters 37(2):222–243
Fuji LA (2009) Interpreting truth and lies in stories of conflict and violence. In: Sriram CL, King JC, Mertus JA, Martin-Ortega O, Herman J (eds.) Surviving Field Research: working in violent and difficult situations. Routledge, New York.
Gonsalves A (2016) Applying serious gaming to humanitarian security: a framework for mixed-reality training. In: Vazquez Llorente R, Wall I (eds.) Communications technology and humanitarian delivery: challenges and opportunities for security risk management. European Interagency Security Forum (EISF)
Gundel J (2006) Humanitarian action in the new security environment: policy and operational implications in Somalia and Somaliland. HPG Background Paper
Hilhorst D, Jansen BJ (2010) Humanitarian space as arena: a perspective on the everyday politics of aid. Dev Chang 41(6):1117–1139
HPN (2010) Operational security management in violent environments. Good practice review: number 8. Humanitarian Practice Network, London
IFRC (2013) World disaster report 2013, focus on technology and the future of humanitarian action. International Foundation of the Red Cross and Red Crescent, Geneva
Jacobsen KL (2015) The politics of humanitarian technology: good intentions, unintended consequences and insecurity. Routledge, New York
Janghorban R, Roudsari RL, Taghipour A (2014) Skype interviewing: the new generation of online synchronous interview in qualitative research. Int J Qual Stud Health Well-Being 9:1
Karlsrud J, Rosén F (2013) In the eye of the beholder? UN and the use of drones to protect civilians. Stab Int J Sec Dev 2:2
Mayo A (2016) SMS technology and bulk SMS delivery systems: their role in security management for the humanitarian community. In: Vazquez Llorente R, Wall I (eds.) Communications technology and humanitarian delivery: challenges and opportunities for security risk management. European Interagency Security Forum (EISF)
Meier P (2011) New information technologies and their impact on the humanitarian sector. Int. Rev Red Cross 93(884):1239–1263
Miles MB, Huberman AM, Saldaña J (2013) Qualitative data analysis: a methods sourcebook, 3rd edn. Sage Publications, London
Powell C (2001) Remarks to the National Foreign Policy Conference for leaders of nongovernmental organizations. http://avalon.law.yale.edu/sept11/powell_brief31.asp . Accessed 27 Sept 2017.
Qadir J, Ali A, ru Rasool R, Zwitter A, Sathiaseelan A, Crowcroft J (2016) Crisis analytics: big data-driven crisis response. J Int Humanit Action 1:12
Sandstrom K (2014) Remoteness and ‘demonitored space’ in Afghanistan. Peacebuilding 2(3):286-302. Sage Publications, London
Sandvik KB (2016) The humanitarian cyberspace: shrinking space or an expanding frontier? Third World Q 37(1):17–32
Sandvik KB (2017) Now is the time to deliver: looking for humanitarian innovation’s theory of change. J Int Humanit Action 2:8
Sandvik KB, Jumbert MG, Karlsrud J, Kaufmann M (2014) Humanitarian technology: a critical research agenda. Int Rev Red Cross 96(893):219–242
Sandvik KB, Lohne K (2014) The rise of the humanitarian drone: giving content to an emerging concept. Millennium: J Int Stud 43(1):145-164
Schneiker A (2013) The vulnerable do-gooders: security strategies of German aid agencies. Disasters 37(2):244–266
Sheik M, Gutierrez MI, Bolton P, Spiegel P, Thieren M, Burnham G (2000) Deaths among humanitarian workers. Br Med J 321:166–168
Simpson J (2015) Risk management responses to armed non-state actor risk in Afghanistan. Int Rev Soc Res 5(3):156–166
Steets J, Reichhold U, Sagmeister E (2012) Evaluation and review of humanitarian access strategies in DG ECHO funded interventions. Global Public Policy Institute: ECHO report
Stoddard A, Harmer A, Czwarno M (2017) Aid Worker Security Report 2017: Behind the attacks: a look at the perpetrators of violence against aid workers. Humanitarian Outcomes
Stoddard A, Harmer A, V DiDomenico (2009) Providing aid in insecure environments: 2009 update trends in violence against aid workers and the operational response. HPG Policy Brief 34
Stoddard A, Harmer A, Renouf JS (2010). Once removed: lessons and challenges in remote management of humanitarian operations for insecure areas. Humanitarian Outcomes
UNOCHA (2013) Humanitarianism in the network age. United Nations, New York
Vazquez Llorente R, Wall I (eds.) (2016) Communications technology and humanitarian delivery: challenges and opportunities for security risk management. European Interagency Security Forum (EISF)
Vitaliev D (2009) Cyber security for international aid agencies: a primer. SMI Professional Development Brief 3