SlideShare una empresa de Scribd logo
1 de 2
Descargar para leer sin conexión
Security in Numbers Database (SiND):
                         Monitoring actions that interfere with aid delivery

Information for Project Partners

Insecurity Insight is building a database on security incidents affecting aid delivery from media sources and
information provided by contributing partner organizations. The purpose of the database is to profile
patterns of threat and vulnerability in order to allow agencies to identify evidence-based entry points to
improve security management.

The distinguishing features of this particular initiative are:

         The database is set up to generate information on the patterns and characteristics of all
          types and degree of severity of security incidents to help identify entry points for security
          management.
The database is based on the Taback-Coupland theory of armed violence and offers unique features no
other database on security incidents currently provides. The database tracks information about who did
what to whom, when, where, and with what weapon. While the database can be used to look up global
tallies, its main aim is to provide insight into the patterns and characteristics of incidents and therefore how
to prevent them or mitigate their impact. The relational structure allows analysis of disaggregated and
aggregated categories and the possibility for customization.

Advantages of taking part in the project

By joining this project, you will gain access to data about patterns and trends of violence across agencies
and regions over time, as well as contribute to a better understanding of the threats and vulnerabilities
facing aid workers and aid operations. Your participation enables you to gain a sense of the big picture of
the patterns of violence as well as how your organization’s patterns compare to other similar organizations.
The quality and reliability of the information in the database improves with every additional agency that
joins this initiative.

By being a partner you gain:

     Access to country and regional overviews
Events are searchable by country and regions, which means your agency can request a security profile for
a country in which you are considering opening a new programme or to analyze trends in countries in which
you already work.
     Access to a broad range of type and degree of severity of incidents
The database captures different elements of the incidents ranging from contexts (e.g. crime, active conflict,
denial of access), to the effects on personnel (e.g. threats, injuries, deaths, kidnapping), impact on agency
operations (e.g. loss or theft of supplies, damage to property). The database also tracks responses to
security incidents by agencies (e.g. evacuations, withdrawal) and relevant authorities (e.g. arrest,
prosecution).
 Access to a broad range of long-term trends
The database contains media reported incidents of various types and severity. This allows for tracking for
trends over time.
     Access to aggregated information about security incidents affecting other agencies
The database abides by a strict confidentiality policy but codes the type of affected agency in generic terms
(e.g. INGO, UN Agency). This allows partners to gain access to information from other agencies while
maintaining confidentiality for all affected agencies.

By having your own data included in the database you have the option to request:

     Tailor-made data analysis of patterns, threats, and vulnerabilities
The relational structure of the database offers myriad possibilities for extracting information for further
analysis. For example, this makes it possible to compare the incident patterns of your organisation with that
of similar or different organisations (specific NGO to generic NGOs or NGO to UN or vice versa) or to
compare operations in different contexts.

In addition, you will receive copies of all non-confidential outputs from the database.

Contributing to the Project

Participating organizations contribute basic incident descriptions to this database to supplement and
complement information from public sources. Insecurity Insight will create individual Memoranda of
Understanding with interested organizations to address specific interests or concerns.

Submitting information is quick and easy. The database creates an “event catalogue” that centers on the
analysis of: Who did what to whom, when, where, and with what weapon. Basic information on these
factors is all that is needed. Agencies can choose between different methods of contributing information to
suit different working practices in terms of information storage and frequency of submission.
Information can be submitted:

      in the form of incident descriptions using plain English, French (or any other language after prior
       consultation)
      using a spreadsheet and codebook provided by Insecurity Insight

Agencies can decide on their own preferred frequency in which to submit information e.g. after an event
occurred, at the end of every week / month / quarter / calendar year etc.


                  Examples of event descriptions needed for inclusion in the database

  On the morning of 4 August, five armed men stopped a clearly marked car at a checkpoint outside
  the capital Mogadishu (Somalia), shot the driver (a local employee) and took three staff members
  hostage, one expatriate and two locals.

  During the night of 5 to 6 September, a group of approximately 10 armed men wearing military
  fatigues entered the compound of our operations in Duja and took five computers and most of the
  medical and food supplies stored in the warehouse. One local staff member was injured.


If you are interested in becoming a partner in the project, please contact Christina Wille at
Christina.Wille@insecurityinsight.org. We look forward to discussing how you might help build and benefit
from the database, with only a minimal investment of time and energy.

Más contenido relacionado

Similar a Security in Numbers Database (SiND): Monitoring Actions that Interfere with Aid Delivery

Practical and Actionable Threat Intelligence Collection
Practical and Actionable Threat Intelligence CollectionPractical and Actionable Threat Intelligence Collection
Practical and Actionable Threat Intelligence CollectionSeamus Tuohy
 
ENG 132Evaluation Argument One Flew Over the Cuckoo’s NestSp.docx
ENG 132Evaluation Argument  One Flew Over the Cuckoo’s NestSp.docxENG 132Evaluation Argument  One Flew Over the Cuckoo’s NestSp.docx
ENG 132Evaluation Argument One Flew Over the Cuckoo’s NestSp.docxgidmanmary
 
Automated Emerging Cyber Threat Identification and Profiling Based on Natural...
Automated Emerging Cyber Threat Identification and Profiling Based on Natural...Automated Emerging Cyber Threat Identification and Profiling Based on Natural...
Automated Emerging Cyber Threat Identification and Profiling Based on Natural...Shakas Technologies
 
Brian Wrote There is a wide range of cybersecurity initiatives .docx
Brian Wrote There is a wide range of cybersecurity initiatives .docxBrian Wrote There is a wide range of cybersecurity initiatives .docx
Brian Wrote There is a wide range of cybersecurity initiatives .docxhartrobert670
 
TERRORIST WATCHER: AN INTERACTIVE WEBBASED VISUAL ANALYTICAL TOOL OF TERRORIS...
TERRORIST WATCHER: AN INTERACTIVE WEBBASED VISUAL ANALYTICAL TOOL OF TERRORIS...TERRORIST WATCHER: AN INTERACTIVE WEBBASED VISUAL ANALYTICAL TOOL OF TERRORIS...
TERRORIST WATCHER: AN INTERACTIVE WEBBASED VISUAL ANALYTICAL TOOL OF TERRORIS...IJDKP
 
TERRORIST WATCHER: AN INTERACTIVE WEBBASED VISUAL ANALYTICAL TOOL OF TERRORIS...
TERRORIST WATCHER: AN INTERACTIVE WEBBASED VISUAL ANALYTICAL TOOL OF TERRORIS...TERRORIST WATCHER: AN INTERACTIVE WEBBASED VISUAL ANALYTICAL TOOL OF TERRORIS...
TERRORIST WATCHER: AN INTERACTIVE WEBBASED VISUAL ANALYTICAL TOOL OF TERRORIS...IJDKP
 
Intelligence support to Non-Governmental Organisations (NGOs)
Intelligence support to Non-Governmental Organisations (NGOs)Intelligence support to Non-Governmental Organisations (NGOs)
Intelligence support to Non-Governmental Organisations (NGOs)Michael McCabe
 
[M3A1] Data Analysis and Interpretation Specialization
[M3A1] Data Analysis and Interpretation Specialization [M3A1] Data Analysis and Interpretation Specialization
[M3A1] Data Analysis and Interpretation Specialization Andrea Rubio
 
Project 4 Threat Analysis and ExploitationTranscript (backgroun.docx
Project 4 Threat Analysis and ExploitationTranscript (backgroun.docxProject 4 Threat Analysis and ExploitationTranscript (backgroun.docx
Project 4 Threat Analysis and ExploitationTranscript (backgroun.docxstilliegeorgiana
 
A Research Study On Using A Computer Program
A Research Study On Using A Computer ProgramA Research Study On Using A Computer Program
A Research Study On Using A Computer ProgramAimee Brown
 
The 911 Commission Report concluded that the failure of the intelli.docx
The 911 Commission Report concluded that the failure of the intelli.docxThe 911 Commission Report concluded that the failure of the intelli.docx
The 911 Commission Report concluded that the failure of the intelli.docxSANSKAR20
 
NCRIC Analysis of Cyber Security Emergency Management
NCRIC Analysis of Cyber Security Emergency ManagementNCRIC Analysis of Cyber Security Emergency Management
NCRIC Analysis of Cyber Security Emergency ManagementDavid Sweigert
 
Please don’t give me a two to three sentence replies. It has to lo.docx
Please don’t give me a two to three sentence replies. It has to lo.docxPlease don’t give me a two to three sentence replies. It has to lo.docx
Please don’t give me a two to three sentence replies. It has to lo.docxmattjtoni51554
 
Interset-advanced threat detection wp
Interset-advanced threat detection wpInterset-advanced threat detection wp
Interset-advanced threat detection wpCMR WORLD TECH
 
Matt LaVigna - Cyber Security - NCFTA 2017
Matt LaVigna - Cyber Security - NCFTA 2017Matt LaVigna - Cyber Security - NCFTA 2017
Matt LaVigna - Cyber Security - NCFTA 2017Invest Northern Ireland
 
Empowering Cyber Threat Intelligence with AI
Empowering Cyber Threat Intelligence with AIEmpowering Cyber Threat Intelligence with AI
Empowering Cyber Threat Intelligence with AIIJCI JOURNAL
 
Southwestern Business Administration JournalVolume 16 Is.docx
Southwestern Business Administration JournalVolume 16  Is.docxSouthwestern Business Administration JournalVolume 16  Is.docx
Southwestern Business Administration JournalVolume 16 Is.docxrosemariebrayshaw
 
150 words agree or disagreeThis week we discussed data mining an.docx
150 words agree or disagreeThis week we discussed data mining an.docx150 words agree or disagreeThis week we discussed data mining an.docx
150 words agree or disagreeThis week we discussed data mining an.docxdrennanmicah
 
COLLABORATIVE DEFENCE FOR DISTRIBUTED ATTACKS (CASE STUDY OF PALESTINIAN INFO...
COLLABORATIVE DEFENCE FOR DISTRIBUTED ATTACKS (CASE STUDY OF PALESTINIAN INFO...COLLABORATIVE DEFENCE FOR DISTRIBUTED ATTACKS (CASE STUDY OF PALESTINIAN INFO...
COLLABORATIVE DEFENCE FOR DISTRIBUTED ATTACKS (CASE STUDY OF PALESTINIAN INFO...IJNSA Journal
 
wp-us-cities-exposed
wp-us-cities-exposedwp-us-cities-exposed
wp-us-cities-exposedNumaan Huq
 

Similar a Security in Numbers Database (SiND): Monitoring Actions that Interfere with Aid Delivery (20)

Practical and Actionable Threat Intelligence Collection
Practical and Actionable Threat Intelligence CollectionPractical and Actionable Threat Intelligence Collection
Practical and Actionable Threat Intelligence Collection
 
ENG 132Evaluation Argument One Flew Over the Cuckoo’s NestSp.docx
ENG 132Evaluation Argument  One Flew Over the Cuckoo’s NestSp.docxENG 132Evaluation Argument  One Flew Over the Cuckoo’s NestSp.docx
ENG 132Evaluation Argument One Flew Over the Cuckoo’s NestSp.docx
 
Automated Emerging Cyber Threat Identification and Profiling Based on Natural...
Automated Emerging Cyber Threat Identification and Profiling Based on Natural...Automated Emerging Cyber Threat Identification and Profiling Based on Natural...
Automated Emerging Cyber Threat Identification and Profiling Based on Natural...
 
Brian Wrote There is a wide range of cybersecurity initiatives .docx
Brian Wrote There is a wide range of cybersecurity initiatives .docxBrian Wrote There is a wide range of cybersecurity initiatives .docx
Brian Wrote There is a wide range of cybersecurity initiatives .docx
 
TERRORIST WATCHER: AN INTERACTIVE WEBBASED VISUAL ANALYTICAL TOOL OF TERRORIS...
TERRORIST WATCHER: AN INTERACTIVE WEBBASED VISUAL ANALYTICAL TOOL OF TERRORIS...TERRORIST WATCHER: AN INTERACTIVE WEBBASED VISUAL ANALYTICAL TOOL OF TERRORIS...
TERRORIST WATCHER: AN INTERACTIVE WEBBASED VISUAL ANALYTICAL TOOL OF TERRORIS...
 
TERRORIST WATCHER: AN INTERACTIVE WEBBASED VISUAL ANALYTICAL TOOL OF TERRORIS...
TERRORIST WATCHER: AN INTERACTIVE WEBBASED VISUAL ANALYTICAL TOOL OF TERRORIS...TERRORIST WATCHER: AN INTERACTIVE WEBBASED VISUAL ANALYTICAL TOOL OF TERRORIS...
TERRORIST WATCHER: AN INTERACTIVE WEBBASED VISUAL ANALYTICAL TOOL OF TERRORIS...
 
Intelligence support to Non-Governmental Organisations (NGOs)
Intelligence support to Non-Governmental Organisations (NGOs)Intelligence support to Non-Governmental Organisations (NGOs)
Intelligence support to Non-Governmental Organisations (NGOs)
 
[M3A1] Data Analysis and Interpretation Specialization
[M3A1] Data Analysis and Interpretation Specialization [M3A1] Data Analysis and Interpretation Specialization
[M3A1] Data Analysis and Interpretation Specialization
 
Project 4 Threat Analysis and ExploitationTranscript (backgroun.docx
Project 4 Threat Analysis and ExploitationTranscript (backgroun.docxProject 4 Threat Analysis and ExploitationTranscript (backgroun.docx
Project 4 Threat Analysis and ExploitationTranscript (backgroun.docx
 
A Research Study On Using A Computer Program
A Research Study On Using A Computer ProgramA Research Study On Using A Computer Program
A Research Study On Using A Computer Program
 
The 911 Commission Report concluded that the failure of the intelli.docx
The 911 Commission Report concluded that the failure of the intelli.docxThe 911 Commission Report concluded that the failure of the intelli.docx
The 911 Commission Report concluded that the failure of the intelli.docx
 
NCRIC Analysis of Cyber Security Emergency Management
NCRIC Analysis of Cyber Security Emergency ManagementNCRIC Analysis of Cyber Security Emergency Management
NCRIC Analysis of Cyber Security Emergency Management
 
Please don’t give me a two to three sentence replies. It has to lo.docx
Please don’t give me a two to three sentence replies. It has to lo.docxPlease don’t give me a two to three sentence replies. It has to lo.docx
Please don’t give me a two to three sentence replies. It has to lo.docx
 
Interset-advanced threat detection wp
Interset-advanced threat detection wpInterset-advanced threat detection wp
Interset-advanced threat detection wp
 
Matt LaVigna - Cyber Security - NCFTA 2017
Matt LaVigna - Cyber Security - NCFTA 2017Matt LaVigna - Cyber Security - NCFTA 2017
Matt LaVigna - Cyber Security - NCFTA 2017
 
Empowering Cyber Threat Intelligence with AI
Empowering Cyber Threat Intelligence with AIEmpowering Cyber Threat Intelligence with AI
Empowering Cyber Threat Intelligence with AI
 
Southwestern Business Administration JournalVolume 16 Is.docx
Southwestern Business Administration JournalVolume 16  Is.docxSouthwestern Business Administration JournalVolume 16  Is.docx
Southwestern Business Administration JournalVolume 16 Is.docx
 
150 words agree or disagreeThis week we discussed data mining an.docx
150 words agree or disagreeThis week we discussed data mining an.docx150 words agree or disagreeThis week we discussed data mining an.docx
150 words agree or disagreeThis week we discussed data mining an.docx
 
COLLABORATIVE DEFENCE FOR DISTRIBUTED ATTACKS (CASE STUDY OF PALESTINIAN INFO...
COLLABORATIVE DEFENCE FOR DISTRIBUTED ATTACKS (CASE STUDY OF PALESTINIAN INFO...COLLABORATIVE DEFENCE FOR DISTRIBUTED ATTACKS (CASE STUDY OF PALESTINIAN INFO...
COLLABORATIVE DEFENCE FOR DISTRIBUTED ATTACKS (CASE STUDY OF PALESTINIAN INFO...
 
wp-us-cities-exposed
wp-us-cities-exposedwp-us-cities-exposed
wp-us-cities-exposed
 

Más de Insecurity Insight

How do security events affecting humanitarian agencies differ between rural a...
How do security events affecting humanitarian agencies differ between rural a...How do security events affecting humanitarian agencies differ between rural a...
How do security events affecting humanitarian agencies differ between rural a...Insecurity Insight
 
Aid, Gender and Security: The Gendered Nature of Security Events Affecting Ai...
Aid, Gender and Security: The Gendered Nature of Security Events Affecting Ai...Aid, Gender and Security: The Gendered Nature of Security Events Affecting Ai...
Aid, Gender and Security: The Gendered Nature of Security Events Affecting Ai...Insecurity Insight
 
Is Terrorism an Issue for Humanitarian Agencies?
Is Terrorism an Issue for Humanitarian Agencies?Is Terrorism an Issue for Humanitarian Agencies?
Is Terrorism an Issue for Humanitarian Agencies?Insecurity Insight
 
Electing to Rape: Sexual Terror in Mugabe's Zimbabwe
Electing to Rape: Sexual Terror in Mugabe's ZimbabweElecting to Rape: Sexual Terror in Mugabe's Zimbabwe
Electing to Rape: Sexual Terror in Mugabe's ZimbabweInsecurity Insight
 
Sixteen Country Study: Health Care in Danger
Sixteen Country Study: Health Care in DangerSixteen Country Study: Health Care in Danger
Sixteen Country Study: Health Care in DangerInsecurity Insight
 
Explosive Violence: The Problem of Explosive Weapons
Explosive Violence: The Problem of Explosive WeaponsExplosive Violence: The Problem of Explosive Weapons
Explosive Violence: The Problem of Explosive WeaponsInsecurity Insight
 
Humanitarian Exchange: The Six Ws of Security Policy Making (p. 6-7)
Humanitarian Exchange: The Six Ws of Security Policy Making (p. 6-7)Humanitarian Exchange: The Six Ws of Security Policy Making (p. 6-7)
Humanitarian Exchange: The Six Ws of Security Policy Making (p. 6-7)Insecurity Insight
 
Security of Journalists: Making the Case for Modelling Armed Violence as a Me...
Security of Journalists: Making the Case for Modelling Armed Violence as a Me...Security of Journalists: Making the Case for Modelling Armed Violence as a Me...
Security of Journalists: Making the Case for Modelling Armed Violence as a Me...Insecurity Insight
 

Más de Insecurity Insight (8)

How do security events affecting humanitarian agencies differ between rural a...
How do security events affecting humanitarian agencies differ between rural a...How do security events affecting humanitarian agencies differ between rural a...
How do security events affecting humanitarian agencies differ between rural a...
 
Aid, Gender and Security: The Gendered Nature of Security Events Affecting Ai...
Aid, Gender and Security: The Gendered Nature of Security Events Affecting Ai...Aid, Gender and Security: The Gendered Nature of Security Events Affecting Ai...
Aid, Gender and Security: The Gendered Nature of Security Events Affecting Ai...
 
Is Terrorism an Issue for Humanitarian Agencies?
Is Terrorism an Issue for Humanitarian Agencies?Is Terrorism an Issue for Humanitarian Agencies?
Is Terrorism an Issue for Humanitarian Agencies?
 
Electing to Rape: Sexual Terror in Mugabe's Zimbabwe
Electing to Rape: Sexual Terror in Mugabe's ZimbabweElecting to Rape: Sexual Terror in Mugabe's Zimbabwe
Electing to Rape: Sexual Terror in Mugabe's Zimbabwe
 
Sixteen Country Study: Health Care in Danger
Sixteen Country Study: Health Care in DangerSixteen Country Study: Health Care in Danger
Sixteen Country Study: Health Care in Danger
 
Explosive Violence: The Problem of Explosive Weapons
Explosive Violence: The Problem of Explosive WeaponsExplosive Violence: The Problem of Explosive Weapons
Explosive Violence: The Problem of Explosive Weapons
 
Humanitarian Exchange: The Six Ws of Security Policy Making (p. 6-7)
Humanitarian Exchange: The Six Ws of Security Policy Making (p. 6-7)Humanitarian Exchange: The Six Ws of Security Policy Making (p. 6-7)
Humanitarian Exchange: The Six Ws of Security Policy Making (p. 6-7)
 
Security of Journalists: Making the Case for Modelling Armed Violence as a Me...
Security of Journalists: Making the Case for Modelling Armed Violence as a Me...Security of Journalists: Making the Case for Modelling Armed Violence as a Me...
Security of Journalists: Making the Case for Modelling Armed Violence as a Me...
 

Último

How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxCarlos105
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
FILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipinoFILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipinojohnmickonozaleda
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfErwinPantujan2
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYKayeClaireEstoconing
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 

Último (20)

How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
FILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipinoFILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipino
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 

Security in Numbers Database (SiND): Monitoring Actions that Interfere with Aid Delivery

  • 1. Security in Numbers Database (SiND): Monitoring actions that interfere with aid delivery Information for Project Partners Insecurity Insight is building a database on security incidents affecting aid delivery from media sources and information provided by contributing partner organizations. The purpose of the database is to profile patterns of threat and vulnerability in order to allow agencies to identify evidence-based entry points to improve security management. The distinguishing features of this particular initiative are:  The database is set up to generate information on the patterns and characteristics of all types and degree of severity of security incidents to help identify entry points for security management. The database is based on the Taback-Coupland theory of armed violence and offers unique features no other database on security incidents currently provides. The database tracks information about who did what to whom, when, where, and with what weapon. While the database can be used to look up global tallies, its main aim is to provide insight into the patterns and characteristics of incidents and therefore how to prevent them or mitigate their impact. The relational structure allows analysis of disaggregated and aggregated categories and the possibility for customization. Advantages of taking part in the project By joining this project, you will gain access to data about patterns and trends of violence across agencies and regions over time, as well as contribute to a better understanding of the threats and vulnerabilities facing aid workers and aid operations. Your participation enables you to gain a sense of the big picture of the patterns of violence as well as how your organization’s patterns compare to other similar organizations. The quality and reliability of the information in the database improves with every additional agency that joins this initiative. By being a partner you gain:  Access to country and regional overviews Events are searchable by country and regions, which means your agency can request a security profile for a country in which you are considering opening a new programme or to analyze trends in countries in which you already work.  Access to a broad range of type and degree of severity of incidents The database captures different elements of the incidents ranging from contexts (e.g. crime, active conflict, denial of access), to the effects on personnel (e.g. threats, injuries, deaths, kidnapping), impact on agency operations (e.g. loss or theft of supplies, damage to property). The database also tracks responses to security incidents by agencies (e.g. evacuations, withdrawal) and relevant authorities (e.g. arrest, prosecution).
  • 2.  Access to a broad range of long-term trends The database contains media reported incidents of various types and severity. This allows for tracking for trends over time.  Access to aggregated information about security incidents affecting other agencies The database abides by a strict confidentiality policy but codes the type of affected agency in generic terms (e.g. INGO, UN Agency). This allows partners to gain access to information from other agencies while maintaining confidentiality for all affected agencies. By having your own data included in the database you have the option to request:  Tailor-made data analysis of patterns, threats, and vulnerabilities The relational structure of the database offers myriad possibilities for extracting information for further analysis. For example, this makes it possible to compare the incident patterns of your organisation with that of similar or different organisations (specific NGO to generic NGOs or NGO to UN or vice versa) or to compare operations in different contexts. In addition, you will receive copies of all non-confidential outputs from the database. Contributing to the Project Participating organizations contribute basic incident descriptions to this database to supplement and complement information from public sources. Insecurity Insight will create individual Memoranda of Understanding with interested organizations to address specific interests or concerns. Submitting information is quick and easy. The database creates an “event catalogue” that centers on the analysis of: Who did what to whom, when, where, and with what weapon. Basic information on these factors is all that is needed. Agencies can choose between different methods of contributing information to suit different working practices in terms of information storage and frequency of submission. Information can be submitted:  in the form of incident descriptions using plain English, French (or any other language after prior consultation)  using a spreadsheet and codebook provided by Insecurity Insight Agencies can decide on their own preferred frequency in which to submit information e.g. after an event occurred, at the end of every week / month / quarter / calendar year etc. Examples of event descriptions needed for inclusion in the database On the morning of 4 August, five armed men stopped a clearly marked car at a checkpoint outside the capital Mogadishu (Somalia), shot the driver (a local employee) and took three staff members hostage, one expatriate and two locals. During the night of 5 to 6 September, a group of approximately 10 armed men wearing military fatigues entered the compound of our operations in Duja and took five computers and most of the medical and food supplies stored in the warehouse. One local staff member was injured. If you are interested in becoming a partner in the project, please contact Christina Wille at Christina.Wille@insecurityinsight.org. We look forward to discussing how you might help build and benefit from the database, with only a minimal investment of time and energy.