Hostname: page-component-78c5997874-v9fdk Total loading time: 0 Render date: 2024-11-15T09:18:09.660Z Has data issue: false hasContentIssue false

Neglect and Failures of Human Security in Humanitarian Settings: Challenges and Recommendations

Published online by Cambridge University Press:  29 January 2013

Robert Macpherson*
Affiliation:
Cosantoir Group, Charlotte, North Carolina USA
Frederick M. Burkle Jr.
Affiliation:
Harvard Humanitarian Initiative, Harvard University, Cambridge, Massachusetts USA Woodrow Wilson International Center for Scholars, Washington, DC USA
*
Correspondence: Robert Macpherson, BA Cosantoir Group 2823 Providence Road, Suite 125 Charlotte, NC 28211 USA E-mail [email protected]

Abstract

The lack of attention to basic safety and security standards by the humanitarian community is endemic. The tragic bombing and loss of life of the United Nations Assistance Mission in Iraq in 2003 is but one of many unfortunate examples; these incidents are increasing in number. Tools for establishing an organizational security framework are readily available. Capacity to implement this framework requires understanding the culture of safety and security and individual and organizational leadership. This report outlines the essential steps and components necessary to meet this requirement.

MacphersonR, Burkle FM Jr. Neglect and Failures of Human Security in Humanitarian Settings: Challenges and Recommendations. Prehosp Disaster Med. 2013;28(2):1-5.

Type
Special Report
Copyright
Copyright © World Association for Disaster and Emergency Medicine 2013

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

1.United Nations. Press Briefing by Manoel de Almeida e Silva, Spokesman for the Special Representative of the Secretary-General on Afghanistan. August 21, 2003. http://www.un.org/apps/news/infocusnews.asp?NewsID=597&sID=1. Accessed October 22, 2012.Google Scholar
2.United Nations. Report of the Independent Panel on the Safety and Security of UN Personnel in Iraq, October 20, 2003, Executive Summary. http://www.un.org/News/dh/iraq/safety-security-un-personnel-iraq.pdf. Accessed October 22, 2012.Google Scholar
3.United Nations. UN-SIAP-Security in Iraq Accountability Panel Report Summary-2004 Security Management Initiative. http://securitymanagementinitiative.org/ Accessed October 23, 2012.Google Scholar
4. InterAction. Suggested Guidance for Implementing InterAction's Minimum Operating Security Standards (MOSS), MOSS Implementation. June 14, 2006.Google Scholar
5.Kemp, E, Merkelbach, M. Can you get sued? Legal liability of international humanitarian aid organisations towards their staff. Security Management Initiative (SMI), Geneva Centre for Security Policy, November 2011.Google Scholar
6.Macpherson, R, Pafford, B. Safety and Security Handbook. Safety and Security Responsibilities. Care International. 2004:7.Google Scholar
7.Gibbs, NE. Elements of a Good Security Architecture. Internal Auditor. February 2007.Google Scholar
8.United Nations. Towards a Culture of Security and Accountability. The Report of the Independent Panel on Safety and Security of UN Personnel and Premises Worldwide. June 9, 2008:60-74.Google Scholar
9. Hostile Environment Awareness Training (HEAT). http://www.torinternational.com/training/index.htm?project=5&subpage=13. Accessed October 24, 2012.Google Scholar
10.Aid Worker Security Database (AWSD). Major Attacks on Aid Workers: Summary Statistics for 2011. https://aidworkersecurity.org/incidents/report/summary. Accessed October 31, 2012.Google Scholar
11.Stoddard, A, Harmer, A. Supporting Security for Humanitarian Action: A Review of Critical Issues for the Humanitarian Community. Humanitarian Outcomes. Commissioned by conveners of the Montreux X conference, March 2010. http://transition.usaid.gov/our_work/humanitarian_assistance/disaster_assistance/consultations/fy2010/supporting_security_humanitarian_action.pdf. Accessed October 21, 2012.Google Scholar