SlideShare a Scribd company logo
1 of 7
Download to read offline
Insecurity
          Insight                                    Data on People in Danger


Security Facts for Humanitarian Aid Agencies
Aid, Gender and Security:
The Gendered Nature of Security Events
Affecting Aid Workers and Aid Delivery
Christina Wille & Larissa Fast

Starting the discussion
Do men and women experience different types of security events? Are there differences in
the attitudes within humanitarian agencies towards the same type of events affecting men or
women? In this paper, using the Security in Numbers Database (SiND), we analyze the differences
and similarities in men’s and women’s experiences of security events to help agencies think
about the potential gender implications of security management. The data analysed here
reflect information on 1,361 staff members affected in 615 security incidents contained within
the database.i The description of the “six Ws” – who did what, to whom, where, when and with
what weapon – used in this document are compiled from aid agency reports (47.7% of the total
reports) and from media and other public sources over a period of 30 months, between 1 July
2008 and 31 December 2010.

The European Interagency Security Forum (EISF) identified gender as an important but overlooked
issue in the humanitarian security debate, and highlighted it at the EISF bi-annual meeting
in March 2011. EISF asked Insecurity Insight to analyse gender using the SiND data. Christina
Wille and Larissa Fast thank Oliver Behn and Madeleine Kingston for their valuable input in the
preparation of this paper.


What kind of data do we have to analyse the gendered nature of
security events?
The short answer to this question is very little, since information on gender is not systematically
available in relation to violence affecting aid workers and aid delivery. The SiND includes
information on a victim’s sex whenever mentioned in a report, but for 42.8% of all affected people
(583 of 1,361 individuals) the event description did not include the victim’s sex. In comparison,
information about the victim’s international or national staff status is missing in only 8.9% of cases.
The scarcity with which information on victims’ sex is made public is likely a result of a general
lack of awareness of the importance of gender analysis and concern for the privacy of affected
staff. As a result, most NGOs deliberately do not reveal any personal information on the victim,
including information about the victim’s sex, in event descriptions reported in the media, or via NGO
information sharing mechanisms, such as ANSO in Afghanistan. Another factor is the large number
of English language reports used in the database, as the gender neutrality of English does not
reveal a victim’s sex through grammatical structures, as would be the case in other languages.


www.insecurityinsight.org                                   © Insecurity Insight 2011         page 1
Interpreting the data:
Are men more affected by security events than women?
Security event descriptions mention men as victims more frequently than women. As of 31
December 2010, the SiND contained reference to 420 male victims and 202 ‘most likely male’
victimsii (622, or 45.7%), and 151 female victims and 5 ‘most likely female’ victimsiii (156, or 11.5%).
Graph 1 highlights the proportion of victims identified as men or women and those victims for
whom no information on the sex is available for ‘all affected victims’ and for victims of six different
categories of security events. Men comprise between 29.9% (for threats) to 64.9% (for fatalities) of
victims. The same graph also shows the large but variable proportion of victims about whom we
have no information regarding their sex. The extent of missing information influences the overall
proportions of the different types of security events affecting men and women. For example, the
relatively low rate of unknown sex for fatalities (22.1%) and the high rate of unknown sex victims
for threat events (57.1%) influences the proportion of affected men, which therefore appears
high for fatalities (64.9%) and low for threats (29.9%). As a result, we do not use the absolute
proportion of men and women victims of a particular type of security event as a definitive
indicator suggesting that certain types of security events affect more men or more women.

Graph 1
Proportion of reported male and female victims and victims of unknown sex for all victims,
victims of fatalities, injuries, kidnapping, crime, arrest and threats
% of total victims




Moreover, the higher rate of reported male victims should not be interpreted as indicating that
men are necessarily at a higher risk per se. Other factors could explain the finding. For example,
the total number of affected male victims would be higher if aid agencies employ more men in
the field, if more men work in highly dangerous environments, or if men are assigned to more
risky occupations. Unfortunately, there are no data available about the sex (or number) of all staff
whom humanitarian agencies employ or the type of occupations they hold, both of which would
permit an assessment of the relative danger for men and women. In the absence of such data,
we do not draw conclusions about the absolute level of risk that men or women face. Instead,
we examine the data to highlight differences in the proportions of different types of incidents
that affect men and women as a way to describe the similarities and differences in how security
events affect men and women, and report on only those factors for which the proportions are
different.




www.insecurityinsight.org                                    © Insecurity Insight 2011         page 2
Graph 2 shows Insecurity Insight’s approach to security event analysis in the face of incomplete
data. The chart identifies the different proportions of male and female victims for particular
characteristics or types of security events in relation to the proportion of all reported male
and female victims, respectively. For example, of the 156 women who experienced security
events, 39 were threatened (25%), while 90 of the 622 men who experienced security events were
threatened (14.5%). We would expect the proportion of all men and women who experienced
threats to be the same if the risk of being threatened was the same for both men and women.
The difference of 10.5 percent between the rate to which men and women experienced threats
suggests that women experience proportionally more threat events than men.

Based on this analysis, Graph 2 highlights that men are more vulnerable to injuries, death, direct
effects of active fighting by conflict parties, and arrests, while women experience proportionally
more threat and crime events. The difference in vulnerability of kidnappings between men and
women is very small (-0.9%).

Graph 2
Differences in proportion of events affecting men and women by type (threats, crime,
kidnappings, arrests, active fighting, violent deaths or injuries).




www.insecurityinsight.org                                © Insecurity Insight 2011       page 3
Perpetrators of security events and their weapons
Are there perpetrators who target proportionally more women or men? Are there differences in
the weapons used against men and women? Graph 3 shows the differences in the proportion
of violent acts against men and women by perpetrator (state military, non-state actors, law
enforcement bodies, officials, and civilians) and the weapons they use (firearms, explosives, easily
accessible weapons, or no weapons at all). The findings suggest that women are particularly
vulnerable to security events perpetrated by criminals and civilians (including employees, former
employees or beneficiaries of programmes) and administrative decisions by the host authorities
that affect the agency’s ability to continue its work unhindered. Those perpetrators who use
weapons against women make greater use of easily accessible weapons (such as knives or sticks),
but many perpetrators of violence against female aid workers use no weapons at all.

Men bear the brunt of security events for which state militaries are responsible and are
proportionally more often the target of non-state actors. They are also proportionally more often
present during events in which explosives or firearms affect an aid agency. These findings likely
explain why male victims experience the higher rates of injury and death, as shown in graph 2.


Graphs 3a and b
Differences in proportion of perpetrator categories targeting men and women and the
weapon types used in security events against men and women




Environments in which security events take place
Are there locations where women are more frequently victimized during security events than
men? Graph 4 shows the differences in the proportion to which security events affect men or
women by location (urban and rural areas, while traveling, or at workplace or residence) and
via mode of communication. The graph indicates that women experience proportionally more
security events in urban areas and at their residence, place of work (such as office or project site)
or organizational compound. They also receive proportionally more threats via phone, SMS, email
or by letter than men. Men, by contrast, are proportionally more frequently victimized in rural
areas and while travelling on the road or on water.




www.insecurityinsight.org                                  © Insecurity Insight 2011        page 4
Graph 4
Differences in proportion of security events affecting men and women in defined environments




Regional differences
Are there regions in the world where more men are affected by security events than women?
Graph 5 shows regional groupings of security events and highlights that men are proportionally
more affected by events in the Middle Eastiv and Asiav while women are proportionally more
frequently affected in Africavi and Latin Americavii . Individually, however, countries show only
very small differences to the extent to which men or women are affected by security events, with
the exception of Afghanistan, where men appear to be more vulnerable.

Graph 5
Differences in proportion of security events affecting men and women in different regions
of the world




www.insecurityinsight.org                                © Insecurity Insight 2011       page 5
Security events and the impact on the delivery of aid
Are there differences in the operational consequences of security events that victimize men or
women? Do humanitarian agencies make different operational decisions that affect the delivery
of aid following security events that affect men or women? The initial data analysis suggests that
security events that affect men have a greater impact on the delivery of aid than events that affect
women. Agencies are more likely to make operational decisions, such as the restriction of staff
movement, program closure or withdrawal, that negatively affect the delivery of aid following
security events that affect men (2.3%). Security events that force agencies to close programs or
withdraw, such as a forced closure of programs or extensive damage to facilities, are even more
common after security events that affect men (5.0% more common).
Graph 6
Difference in proportion of security events affecting men and women that impact the delivery
of aid




      Percentages refer to the difference in the number of security events that affect men and
      women that led to changes in an agency’s ability to deliver aid




What does this first look at the data tell us and what do the
findings mean?
All types of security events clearly affect both men and women. Based on available data, however,
a higher proportion of men face specific vulnerabilities that proportionally fewer women
experience and vice versa. The analysis here suggests that women are more vulnerable to a
range of lesser security events such as crime and threats, particularly those in urban areas and
places where they ought to feel safe (such as residences and work spaces). Men, on the other
hand, experience a higher proportion of two types of serious security events: those involving
lethal weapons and those that occur frequently on the road, meaning they take place outside
of a defined work environment, such as an office or compound. For kidnappings, little difference
exists between men and women’s vulnerability. Are these observed patterns primarily influenced
by a victim’s sex or could other factors contribute to the observed patterns? This question is
impossible to answer without further information and analysis.

The initial finding that security events that affect men have a greater impact on the delivery of
aid generates more questions than insight. Several explanations are possible. The finding could
reflect the more serious nature of events affecting a greater proportion of men, such as violent
deaths or the context of active fighting. It could potentially point to an attitude that sees women
as naturally vulnerable and men’s victimisation as an indication of serious risk for future work. It
is also possible that reporting inconsistencies about the consequences of events on the delivery


www.insecurityinsight.org                                              © Insecurity Insight 2011   page 6
of aid are responsible for this finding rather than actual differences in operational procedures or
decisions. Again, better information and further analysis is necessary.

In thinking about gender and individual agency experiences, reporting practices, and security
management, those responsible for security may want to consider the following questions:

     •	    Does your agency systematically record whether the victim was a man or woman? Is
           this information available (e.g., to Insecurity Insight or via other information sharing
           mechanisms) for further analysis?
     •	    Do the observed profiles discussed in this paper fit the overall pattern you observe for
           your organization? If not, where do you see differences?
     •	    Do you see connections, such as expatriate status or particular job position, that could
           explain how particular types of security events affect women or men? Would your
           agency consider making more information available of the type of job held by a victim
           within the agency (e.g., within particular categories such as driver, guard, office worker,
           programme staff, head of office etc.) to facilitate this type of analysis?
     •	    What other factors might influence vulnerabilities for men and women, in addition to
           gender?
     •	    What are the types of security incidents that lead to operational decisions that affect
           service delivery? Do you see any reason why security events affecting men might be
           regarded as indicating higher risk to operations? What other structural contexts may
           explain this finding?

This paper presents a first look using incomplete data, and describes tentative findings intended
as the beginning of a process of more comprehensive gender analysis of security events.
Preliminary analysis suggests particular patterns for further examination, using both quantitative
and qualitative methods. It is only in systematically collecting more complete information about
gender that we will be better able to answer questions about the differential risks that men and
women face in the field.




i	
     The database contains a total of 1,224 events but only 615 of these affected staff members (professional and 	
     support staff such as drivers) rather than infrastructure, operations or beneficiaries.
ii 	 A victim was classified as ‘most likely male’ based on a masculine first name or when the report specified that the victim
     worked as a security guard or driver, since these are male-dominated professions.
iii 	A victim was classified as ‘most likely female’ based on a feminine first name, the profession (e.g., midwife), the fact that the
     thief stole a ‘handbag’, or based on the tick-box information in a report submitted by a partner agency that a ‘female was
     involved’.
iv 	Included countries are: Iran, Iraq, Jordan, Occupied Palestinian Territories and Yemen.
v 	Included countries are: Afghanistan, Bangladesh, East Timor, Indonesia, Kyrgyzstan, Nepal, Pakistan, Philippines, Papua New
     Guinea, Sri Lanka, Vietnam and Thailand.
vi 	Included countries are: Angola, Burundi, Cameron, Central African Republic, Chad, Darfur, DRC, Ethiopia, Gambia, Kenya,
     Liberia, Madagascar, Malawi, Mali, Mauritania, Mozambique, Niger, North Sudan, Rwanda, 	 Senegal, Sierra Leone, Somalia,
     South Africa, South Sudan, Tanzania, Uganda and Zimbabwe.
vii 	Included countries are: Bolivia, Colombia, Dominican Republic, Guatemala, Haiti, Honduras, Lima, Mexico and 	
     Nicaragua.




www.insecurityinsight.org                                                      © Insecurity Insight 2011                   page 7

More Related Content

What's hot

Work Place Bullying Institute
Work Place Bullying Institute Work Place Bullying Institute
Work Place Bullying Institute tlonm
 
Intimate Partner Violence Prevention_Program Plan
Intimate Partner Violence Prevention_Program PlanIntimate Partner Violence Prevention_Program Plan
Intimate Partner Violence Prevention_Program PlanTara DeMaderios
 
Victimization - Criminology
Victimization - CriminologyVictimization - Criminology
Victimization - CriminologyDiana Dianot
 
Violence in the Workplace - A Detailed Look Into Active Shooter Situations
Violence in the Workplace - A Detailed Look Into Active Shooter SituationsViolence in the Workplace - A Detailed Look Into Active Shooter Situations
Violence in the Workplace - A Detailed Look Into Active Shooter SituationsDeron Grzetich, CISSP, CISM, GCIH
 
Prevention and Response To Gender-Based Violence in Lagos State [Standard Ope...
Prevention and Response To Gender-Based Violence in Lagos State [Standard Ope...Prevention and Response To Gender-Based Violence in Lagos State [Standard Ope...
Prevention and Response To Gender-Based Violence in Lagos State [Standard Ope...OluwatobiOpadokun
 
2019 IPR Disinformation Study
2019 IPR Disinformation Study2019 IPR Disinformation Study
2019 IPR Disinformation StudyTaylorThelander
 
475 2015 the new media and its impact on politics up
475 2015 the new media and its impact on politics up475 2015 the new media and its impact on politics up
475 2015 the new media and its impact on politics upmpeffl
 
HealthGIS_Lisa_Levoir
HealthGIS_Lisa_LevoirHealthGIS_Lisa_Levoir
HealthGIS_Lisa_LevoirLisa LeVoir
 
Victims of Crime
Victims of CrimeVictims of Crime
Victims of CrimeDani Cathro
 
Sociological Perspectives-2015-Stewart-0731121414557700
Sociological Perspectives-2015-Stewart-0731121414557700Sociological Perspectives-2015-Stewart-0731121414557700
Sociological Perspectives-2015-Stewart-0731121414557700Michele Bendall
 
Pushed (Back) In The Closet March 25 2010[1]
Pushed (Back) In The Closet  March 25 2010[1]Pushed (Back) In The Closet  March 25 2010[1]
Pushed (Back) In The Closet March 25 2010[1]rcamer
 

What's hot (20)

Preparing for Genocide: Community Work in Rwanda
Preparing for Genocide: Community Work in RwandaPreparing for Genocide: Community Work in Rwanda
Preparing for Genocide: Community Work in Rwanda
 
Work Place Bullying Institute
Work Place Bullying Institute Work Place Bullying Institute
Work Place Bullying Institute
 
FinalLitReview
FinalLitReviewFinalLitReview
FinalLitReview
 
Untitled 1
Untitled 1Untitled 1
Untitled 1
 
Victims and offenders
Victims and offendersVictims and offenders
Victims and offenders
 
Intimate Partner Violence Prevention_Program Plan
Intimate Partner Violence Prevention_Program PlanIntimate Partner Violence Prevention_Program Plan
Intimate Partner Violence Prevention_Program Plan
 
Victimization - Criminology
Victimization - CriminologyVictimization - Criminology
Victimization - Criminology
 
Violence in the Workplace - A Detailed Look Into Active Shooter Situations
Violence in the Workplace - A Detailed Look Into Active Shooter SituationsViolence in the Workplace - A Detailed Look Into Active Shooter Situations
Violence in the Workplace - A Detailed Look Into Active Shooter Situations
 
Prevention and Response To Gender-Based Violence in Lagos State [Standard Ope...
Prevention and Response To Gender-Based Violence in Lagos State [Standard Ope...Prevention and Response To Gender-Based Violence in Lagos State [Standard Ope...
Prevention and Response To Gender-Based Violence in Lagos State [Standard Ope...
 
Victimology
VictimologyVictimology
Victimology
 
Victims
VictimsVictims
Victims
 
2019 IPR Disinformation Study
2019 IPR Disinformation Study2019 IPR Disinformation Study
2019 IPR Disinformation Study
 
Violent Crime in America
Violent Crime in AmericaViolent Crime in America
Violent Crime in America
 
475 2015 the new media and its impact on politics up
475 2015 the new media and its impact on politics up475 2015 the new media and its impact on politics up
475 2015 the new media and its impact on politics up
 
HealthGIS_Lisa_Levoir
HealthGIS_Lisa_LevoirHealthGIS_Lisa_Levoir
HealthGIS_Lisa_Levoir
 
Victims of Crime
Victims of CrimeVictims of Crime
Victims of Crime
 
Poverty, Exclusion, and Dissent - Support for Regimes in Developing Countries
Poverty, Exclusion, and Dissent - Support for Regimes in Developing CountriesPoverty, Exclusion, and Dissent - Support for Regimes in Developing Countries
Poverty, Exclusion, and Dissent - Support for Regimes in Developing Countries
 
Sociological Perspectives-2015-Stewart-0731121414557700
Sociological Perspectives-2015-Stewart-0731121414557700Sociological Perspectives-2015-Stewart-0731121414557700
Sociological Perspectives-2015-Stewart-0731121414557700
 
SAAAAVE
SAAAAVESAAAAVE
SAAAAVE
 
Pushed (Back) In The Closet March 25 2010[1]
Pushed (Back) In The Closet  March 25 2010[1]Pushed (Back) In The Closet  March 25 2010[1]
Pushed (Back) In The Closet March 25 2010[1]
 

Viewers also liked

TURKCELL İLETİŞİM HİZMETLERİ 2012 ÜÇÜNCÜ ÇEYREK SONUÇLARI
TURKCELL İLETİŞİM HİZMETLERİ 2012 ÜÇÜNCÜ ÇEYREK  SONUÇLARITURKCELL İLETİŞİM HİZMETLERİ 2012 ÜÇÜNCÜ ÇEYREK  SONUÇLARI
TURKCELL İLETİŞİM HİZMETLERİ 2012 ÜÇÜNCÜ ÇEYREK SONUÇLARIErol Dizdar
 
N 4 (Dorsey & Whitney)
N 4 (Dorsey & Whitney)N 4 (Dorsey & Whitney)
N 4 (Dorsey & Whitney)mcd202dc
 
Cravatex ltd (BSE Code 509472) - Katalyst Wealth Alpha Recommendation 14th Fe...
Cravatex ltd (BSE Code 509472) - Katalyst Wealth Alpha Recommendation 14th Fe...Cravatex ltd (BSE Code 509472) - Katalyst Wealth Alpha Recommendation 14th Fe...
Cravatex ltd (BSE Code 509472) - Katalyst Wealth Alpha Recommendation 14th Fe...Katalyst Wealth
 
EiTESAL IOT DAY 26-10-2016
EiTESAL IOT DAY 26-10-2016EiTESAL IOT DAY 26-10-2016
EiTESAL IOT DAY 26-10-2016EITESANGO
 
HR Services Quality Assurance - Final Presentation
HR Services Quality Assurance - Final PresentationHR Services Quality Assurance - Final Presentation
HR Services Quality Assurance - Final PresentationJean-S MASIALA
 
Business Intelligence Dashboard best practice webinar (2013)
Business Intelligence Dashboard best practice webinar (2013)Business Intelligence Dashboard best practice webinar (2013)
Business Intelligence Dashboard best practice webinar (2013)Yellowfin
 
IT to IoT: The Journey to Nextgen - By Rajesh Batra
IT to IoT: The Journey to Nextgen - By Rajesh BatraIT to IoT: The Journey to Nextgen - By Rajesh Batra
IT to IoT: The Journey to Nextgen - By Rajesh BatraRahul Neel Mani
 
Analysis In Agile: It's More than Just User Stories
Analysis In Agile: It's More than Just User StoriesAnalysis In Agile: It's More than Just User Stories
Analysis In Agile: It's More than Just User StoriesKent McDonald
 
A Comparative Study of Mobile Services Provided By Vodafone & Other Telecom C...
A Comparative Study of Mobile Services Provided By Vodafone & Other Telecom C...A Comparative Study of Mobile Services Provided By Vodafone & Other Telecom C...
A Comparative Study of Mobile Services Provided By Vodafone & Other Telecom C...ASIF KHAN
 
PRESENTATION ON CCE [ IX & X ]
PRESENTATION ON CCE [ IX & X ]PRESENTATION ON CCE [ IX & X ]
PRESENTATION ON CCE [ IX & X ]Rajesh Batra
 
Power & Urban Space
Power & Urban SpacePower & Urban Space
Power & Urban Spaceasawari62
 

Viewers also liked (14)

BIREN RESUME
BIREN RESUMEBIREN RESUME
BIREN RESUME
 
TURKCELL İLETİŞİM HİZMETLERİ 2012 ÜÇÜNCÜ ÇEYREK SONUÇLARI
TURKCELL İLETİŞİM HİZMETLERİ 2012 ÜÇÜNCÜ ÇEYREK  SONUÇLARITURKCELL İLETİŞİM HİZMETLERİ 2012 ÜÇÜNCÜ ÇEYREK  SONUÇLARI
TURKCELL İLETİŞİM HİZMETLERİ 2012 ÜÇÜNCÜ ÇEYREK SONUÇLARI
 
N 4 (Dorsey & Whitney)
N 4 (Dorsey & Whitney)N 4 (Dorsey & Whitney)
N 4 (Dorsey & Whitney)
 
Cravatex ltd (BSE Code 509472) - Katalyst Wealth Alpha Recommendation 14th Fe...
Cravatex ltd (BSE Code 509472) - Katalyst Wealth Alpha Recommendation 14th Fe...Cravatex ltd (BSE Code 509472) - Katalyst Wealth Alpha Recommendation 14th Fe...
Cravatex ltd (BSE Code 509472) - Katalyst Wealth Alpha Recommendation 14th Fe...
 
ITS IMPOSSIBLE
ITS IMPOSSIBLEITS IMPOSSIBLE
ITS IMPOSSIBLE
 
EiTESAL IOT DAY 26-10-2016
EiTESAL IOT DAY 26-10-2016EiTESAL IOT DAY 26-10-2016
EiTESAL IOT DAY 26-10-2016
 
HR Services Quality Assurance - Final Presentation
HR Services Quality Assurance - Final PresentationHR Services Quality Assurance - Final Presentation
HR Services Quality Assurance - Final Presentation
 
Business Intelligence Dashboard best practice webinar (2013)
Business Intelligence Dashboard best practice webinar (2013)Business Intelligence Dashboard best practice webinar (2013)
Business Intelligence Dashboard best practice webinar (2013)
 
TrendLab Telco Report 2013/2014
TrendLab Telco Report 2013/2014TrendLab Telco Report 2013/2014
TrendLab Telco Report 2013/2014
 
IT to IoT: The Journey to Nextgen - By Rajesh Batra
IT to IoT: The Journey to Nextgen - By Rajesh BatraIT to IoT: The Journey to Nextgen - By Rajesh Batra
IT to IoT: The Journey to Nextgen - By Rajesh Batra
 
Analysis In Agile: It's More than Just User Stories
Analysis In Agile: It's More than Just User StoriesAnalysis In Agile: It's More than Just User Stories
Analysis In Agile: It's More than Just User Stories
 
A Comparative Study of Mobile Services Provided By Vodafone & Other Telecom C...
A Comparative Study of Mobile Services Provided By Vodafone & Other Telecom C...A Comparative Study of Mobile Services Provided By Vodafone & Other Telecom C...
A Comparative Study of Mobile Services Provided By Vodafone & Other Telecom C...
 
PRESENTATION ON CCE [ IX & X ]
PRESENTATION ON CCE [ IX & X ]PRESENTATION ON CCE [ IX & X ]
PRESENTATION ON CCE [ IX & X ]
 
Power & Urban Space
Power & Urban SpacePower & Urban Space
Power & Urban Space
 

Similar to Aid, Gender and Security: The Gendered Nature of Security Events Affecting Aid Workers and Aid Delivery.

Health Inequalities Among Australians
Health Inequalities Among AustraliansHealth Inequalities Among Australians
Health Inequalities Among AustraliansLaura Torres
 
How do security events affecting humanitarian agencies differ between rural a...
How do security events affecting humanitarian agencies differ between rural a...How do security events affecting humanitarian agencies differ between rural a...
How do security events affecting humanitarian agencies differ between rural a...Insecurity Insight
 
Research Review The Impact of DomesticViolence on Children.docx
Research Review The Impact of DomesticViolence on Children.docxResearch Review The Impact of DomesticViolence on Children.docx
Research Review The Impact of DomesticViolence on Children.docxdebishakespeare
 
Running head ASSIGNMENT 4ASSIGNMENT 4Assignment 4 Da.docx
Running head ASSIGNMENT 4ASSIGNMENT 4Assignment 4 Da.docxRunning head ASSIGNMENT 4ASSIGNMENT 4Assignment 4 Da.docx
Running head ASSIGNMENT 4ASSIGNMENT 4Assignment 4 Da.docxjoellemurphey
 
Terrorism_Modelling Paper_BMC_2009_9_91
Terrorism_Modelling Paper_BMC_2009_9_91Terrorism_Modelling Paper_BMC_2009_9_91
Terrorism_Modelling Paper_BMC_2009_9_91Garry Stevens
 
Insecurity a threat to human existence and economic development in nigeria
Insecurity a threat to human existence and economic development in nigeriaInsecurity a threat to human existence and economic development in nigeria
Insecurity a threat to human existence and economic development in nigeriaAlexander Decker
 
12607-Article Text-45033-1-10-20210902 (3).pdf
12607-Article Text-45033-1-10-20210902 (3).pdf12607-Article Text-45033-1-10-20210902 (3).pdf
12607-Article Text-45033-1-10-20210902 (3).pdfEllaRafaela
 
Policy Brief Amy Dunford
Policy Brief Amy DunfordPolicy Brief Amy Dunford
Policy Brief Amy DunfordAmy Dunford
 
Angola child soldiers
Angola child soldiersAngola child soldiers
Angola child soldiersguestba9d13
 
Navigating Workplace Violence - A Managers Guide
Navigating Workplace Violence - A Managers GuideNavigating Workplace Violence - A Managers Guide
Navigating Workplace Violence - A Managers GuideTom Huskerson
 
Healthy relationships | Combating cyber bullying (Doc)
Healthy relationships | Combating cyber bullying (Doc)Healthy relationships | Combating cyber bullying (Doc)
Healthy relationships | Combating cyber bullying (Doc)Adele Ramos
 
Running head ISOL 534 – Application Security 1Running head.docx
Running head ISOL 534 – Application Security 1Running head.docxRunning head ISOL 534 – Application Security 1Running head.docx
Running head ISOL 534 – Application Security 1Running head.docxwlynn1
 
Urban violence in Nakuru, Kenya
Urban violence in Nakuru, KenyaUrban violence in Nakuru, Kenya
Urban violence in Nakuru, KenyaFamous Nakuru
 
Terrorism_Pooled Analysis_BMC_2011_11_797
Terrorism_Pooled Analysis_BMC_2011_11_797Terrorism_Pooled Analysis_BMC_2011_11_797
Terrorism_Pooled Analysis_BMC_2011_11_797Garry Stevens
 
Domestic violence essay sample
Domestic violence essay sampleDomestic violence essay sample
Domestic violence essay sampleMarie Fincher
 

Similar to Aid, Gender and Security: The Gendered Nature of Security Events Affecting Aid Workers and Aid Delivery. (20)

Health Inequalities Among Australians
Health Inequalities Among AustraliansHealth Inequalities Among Australians
Health Inequalities Among Australians
 
How do security events affecting humanitarian agencies differ between rural a...
How do security events affecting humanitarian agencies differ between rural a...How do security events affecting humanitarian agencies differ between rural a...
How do security events affecting humanitarian agencies differ between rural a...
 
Violence in the Emergency Department - 1
Violence in the Emergency Department - 1Violence in the Emergency Department - 1
Violence in the Emergency Department - 1
 
Violence in the Emergency Department - 2
Violence in the Emergency Department - 2Violence in the Emergency Department - 2
Violence in the Emergency Department - 2
 
Research Review The Impact of DomesticViolence on Children.docx
Research Review The Impact of DomesticViolence on Children.docxResearch Review The Impact of DomesticViolence on Children.docx
Research Review The Impact of DomesticViolence on Children.docx
 
Running head ASSIGNMENT 4ASSIGNMENT 4Assignment 4 Da.docx
Running head ASSIGNMENT 4ASSIGNMENT 4Assignment 4 Da.docxRunning head ASSIGNMENT 4ASSIGNMENT 4Assignment 4 Da.docx
Running head ASSIGNMENT 4ASSIGNMENT 4Assignment 4 Da.docx
 
Terrorism_Modelling Paper_BMC_2009_9_91
Terrorism_Modelling Paper_BMC_2009_9_91Terrorism_Modelling Paper_BMC_2009_9_91
Terrorism_Modelling Paper_BMC_2009_9_91
 
Insecurity a threat to human existence and economic development in nigeria
Insecurity a threat to human existence and economic development in nigeriaInsecurity a threat to human existence and economic development in nigeria
Insecurity a threat to human existence and economic development in nigeria
 
12607-Article Text-45033-1-10-20210902 (3).pdf
12607-Article Text-45033-1-10-20210902 (3).pdf12607-Article Text-45033-1-10-20210902 (3).pdf
12607-Article Text-45033-1-10-20210902 (3).pdf
 
Policy Brief Amy Dunford
Policy Brief Amy DunfordPolicy Brief Amy Dunford
Policy Brief Amy Dunford
 
Angola child soldiers
Angola child soldiersAngola child soldiers
Angola child soldiers
 
Navigating Workplace Violence - A Managers Guide
Navigating Workplace Violence - A Managers GuideNavigating Workplace Violence - A Managers Guide
Navigating Workplace Violence - A Managers Guide
 
Healthy relationships | Combating cyber bullying (Doc)
Healthy relationships | Combating cyber bullying (Doc)Healthy relationships | Combating cyber bullying (Doc)
Healthy relationships | Combating cyber bullying (Doc)
 
Running head ISOL 534 – Application Security 1Running head.docx
Running head ISOL 534 – Application Security 1Running head.docxRunning head ISOL 534 – Application Security 1Running head.docx
Running head ISOL 534 – Application Security 1Running head.docx
 
Urban violence in Nakuru, Kenya
Urban violence in Nakuru, KenyaUrban violence in Nakuru, Kenya
Urban violence in Nakuru, Kenya
 
Terrorism_Pooled Analysis_BMC_2011_11_797
Terrorism_Pooled Analysis_BMC_2011_11_797Terrorism_Pooled Analysis_BMC_2011_11_797
Terrorism_Pooled Analysis_BMC_2011_11_797
 
Domestic violence essay sample
Domestic violence essay sampleDomestic violence essay sample
Domestic violence essay sample
 
The Mean World Syndrome
The Mean World SyndromeThe Mean World Syndrome
The Mean World Syndrome
 
Latent Transitions in Sexual Violence Perpetration in a nationally representa...
Latent Transitions in Sexual Violence Perpetration in a nationally representa...Latent Transitions in Sexual Violence Perpetration in a nationally representa...
Latent Transitions in Sexual Violence Perpetration in a nationally representa...
 
Severe Child Physical Abuse acpo journal.final
Severe Child Physical Abuse acpo journal.finalSevere Child Physical Abuse acpo journal.final
Severe Child Physical Abuse acpo journal.final
 

More from Insecurity Insight

Security in Numbers Database (SiND): Monitoring Actions that Interfere with A...
Security in Numbers Database (SiND): Monitoring Actions that Interfere with A...Security in Numbers Database (SiND): Monitoring Actions that Interfere with A...
Security in Numbers Database (SiND): Monitoring Actions that Interfere with A...Insecurity Insight
 
Is Terrorism an Issue for Humanitarian Agencies?
Is Terrorism an Issue for Humanitarian Agencies?Is Terrorism an Issue for Humanitarian Agencies?
Is Terrorism an Issue for Humanitarian Agencies?Insecurity Insight
 
Electing to Rape: Sexual Terror in Mugabe's Zimbabwe
Electing to Rape: Sexual Terror in Mugabe's ZimbabweElecting to Rape: Sexual Terror in Mugabe's Zimbabwe
Electing to Rape: Sexual Terror in Mugabe's ZimbabweInsecurity Insight
 
Sixteen Country Study: Health Care in Danger
Sixteen Country Study: Health Care in DangerSixteen Country Study: Health Care in Danger
Sixteen Country Study: Health Care in DangerInsecurity Insight
 
Explosive Violence: The Problem of Explosive Weapons
Explosive Violence: The Problem of Explosive WeaponsExplosive Violence: The Problem of Explosive Weapons
Explosive Violence: The Problem of Explosive WeaponsInsecurity Insight
 
Humanitarian Exchange: The Six Ws of Security Policy Making (p. 6-7)
Humanitarian Exchange: The Six Ws of Security Policy Making (p. 6-7)Humanitarian Exchange: The Six Ws of Security Policy Making (p. 6-7)
Humanitarian Exchange: The Six Ws of Security Policy Making (p. 6-7)Insecurity Insight
 
Security of Journalists: Making the Case for Modelling Armed Violence as a Me...
Security of Journalists: Making the Case for Modelling Armed Violence as a Me...Security of Journalists: Making the Case for Modelling Armed Violence as a Me...
Security of Journalists: Making the Case for Modelling Armed Violence as a Me...Insecurity Insight
 

More from Insecurity Insight (7)

Security in Numbers Database (SiND): Monitoring Actions that Interfere with A...
Security in Numbers Database (SiND): Monitoring Actions that Interfere with A...Security in Numbers Database (SiND): Monitoring Actions that Interfere with A...
Security in Numbers Database (SiND): Monitoring Actions that Interfere with A...
 
Is Terrorism an Issue for Humanitarian Agencies?
Is Terrorism an Issue for Humanitarian Agencies?Is Terrorism an Issue for Humanitarian Agencies?
Is Terrorism an Issue for Humanitarian Agencies?
 
Electing to Rape: Sexual Terror in Mugabe's Zimbabwe
Electing to Rape: Sexual Terror in Mugabe's ZimbabweElecting to Rape: Sexual Terror in Mugabe's Zimbabwe
Electing to Rape: Sexual Terror in Mugabe's Zimbabwe
 
Sixteen Country Study: Health Care in Danger
Sixteen Country Study: Health Care in DangerSixteen Country Study: Health Care in Danger
Sixteen Country Study: Health Care in Danger
 
Explosive Violence: The Problem of Explosive Weapons
Explosive Violence: The Problem of Explosive WeaponsExplosive Violence: The Problem of Explosive Weapons
Explosive Violence: The Problem of Explosive Weapons
 
Humanitarian Exchange: The Six Ws of Security Policy Making (p. 6-7)
Humanitarian Exchange: The Six Ws of Security Policy Making (p. 6-7)Humanitarian Exchange: The Six Ws of Security Policy Making (p. 6-7)
Humanitarian Exchange: The Six Ws of Security Policy Making (p. 6-7)
 
Security of Journalists: Making the Case for Modelling Armed Violence as a Me...
Security of Journalists: Making the Case for Modelling Armed Violence as a Me...Security of Journalists: Making the Case for Modelling Armed Violence as a Me...
Security of Journalists: Making the Case for Modelling Armed Violence as a Me...
 

Recently uploaded

Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxAnaBeatriceAblay2
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Science lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonScience lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonJericReyAuditor
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 

Recently uploaded (20)

Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Science lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonScience lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lesson
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 

Aid, Gender and Security: The Gendered Nature of Security Events Affecting Aid Workers and Aid Delivery.

  • 1. Insecurity Insight Data on People in Danger Security Facts for Humanitarian Aid Agencies Aid, Gender and Security: The Gendered Nature of Security Events Affecting Aid Workers and Aid Delivery Christina Wille & Larissa Fast Starting the discussion Do men and women experience different types of security events? Are there differences in the attitudes within humanitarian agencies towards the same type of events affecting men or women? In this paper, using the Security in Numbers Database (SiND), we analyze the differences and similarities in men’s and women’s experiences of security events to help agencies think about the potential gender implications of security management. The data analysed here reflect information on 1,361 staff members affected in 615 security incidents contained within the database.i The description of the “six Ws” – who did what, to whom, where, when and with what weapon – used in this document are compiled from aid agency reports (47.7% of the total reports) and from media and other public sources over a period of 30 months, between 1 July 2008 and 31 December 2010. The European Interagency Security Forum (EISF) identified gender as an important but overlooked issue in the humanitarian security debate, and highlighted it at the EISF bi-annual meeting in March 2011. EISF asked Insecurity Insight to analyse gender using the SiND data. Christina Wille and Larissa Fast thank Oliver Behn and Madeleine Kingston for their valuable input in the preparation of this paper. What kind of data do we have to analyse the gendered nature of security events? The short answer to this question is very little, since information on gender is not systematically available in relation to violence affecting aid workers and aid delivery. The SiND includes information on a victim’s sex whenever mentioned in a report, but for 42.8% of all affected people (583 of 1,361 individuals) the event description did not include the victim’s sex. In comparison, information about the victim’s international or national staff status is missing in only 8.9% of cases. The scarcity with which information on victims’ sex is made public is likely a result of a general lack of awareness of the importance of gender analysis and concern for the privacy of affected staff. As a result, most NGOs deliberately do not reveal any personal information on the victim, including information about the victim’s sex, in event descriptions reported in the media, or via NGO information sharing mechanisms, such as ANSO in Afghanistan. Another factor is the large number of English language reports used in the database, as the gender neutrality of English does not reveal a victim’s sex through grammatical structures, as would be the case in other languages. www.insecurityinsight.org © Insecurity Insight 2011 page 1
  • 2. Interpreting the data: Are men more affected by security events than women? Security event descriptions mention men as victims more frequently than women. As of 31 December 2010, the SiND contained reference to 420 male victims and 202 ‘most likely male’ victimsii (622, or 45.7%), and 151 female victims and 5 ‘most likely female’ victimsiii (156, or 11.5%). Graph 1 highlights the proportion of victims identified as men or women and those victims for whom no information on the sex is available for ‘all affected victims’ and for victims of six different categories of security events. Men comprise between 29.9% (for threats) to 64.9% (for fatalities) of victims. The same graph also shows the large but variable proportion of victims about whom we have no information regarding their sex. The extent of missing information influences the overall proportions of the different types of security events affecting men and women. For example, the relatively low rate of unknown sex for fatalities (22.1%) and the high rate of unknown sex victims for threat events (57.1%) influences the proportion of affected men, which therefore appears high for fatalities (64.9%) and low for threats (29.9%). As a result, we do not use the absolute proportion of men and women victims of a particular type of security event as a definitive indicator suggesting that certain types of security events affect more men or more women. Graph 1 Proportion of reported male and female victims and victims of unknown sex for all victims, victims of fatalities, injuries, kidnapping, crime, arrest and threats % of total victims Moreover, the higher rate of reported male victims should not be interpreted as indicating that men are necessarily at a higher risk per se. Other factors could explain the finding. For example, the total number of affected male victims would be higher if aid agencies employ more men in the field, if more men work in highly dangerous environments, or if men are assigned to more risky occupations. Unfortunately, there are no data available about the sex (or number) of all staff whom humanitarian agencies employ or the type of occupations they hold, both of which would permit an assessment of the relative danger for men and women. In the absence of such data, we do not draw conclusions about the absolute level of risk that men or women face. Instead, we examine the data to highlight differences in the proportions of different types of incidents that affect men and women as a way to describe the similarities and differences in how security events affect men and women, and report on only those factors for which the proportions are different. www.insecurityinsight.org © Insecurity Insight 2011 page 2
  • 3. Graph 2 shows Insecurity Insight’s approach to security event analysis in the face of incomplete data. The chart identifies the different proportions of male and female victims for particular characteristics or types of security events in relation to the proportion of all reported male and female victims, respectively. For example, of the 156 women who experienced security events, 39 were threatened (25%), while 90 of the 622 men who experienced security events were threatened (14.5%). We would expect the proportion of all men and women who experienced threats to be the same if the risk of being threatened was the same for both men and women. The difference of 10.5 percent between the rate to which men and women experienced threats suggests that women experience proportionally more threat events than men. Based on this analysis, Graph 2 highlights that men are more vulnerable to injuries, death, direct effects of active fighting by conflict parties, and arrests, while women experience proportionally more threat and crime events. The difference in vulnerability of kidnappings between men and women is very small (-0.9%). Graph 2 Differences in proportion of events affecting men and women by type (threats, crime, kidnappings, arrests, active fighting, violent deaths or injuries). www.insecurityinsight.org © Insecurity Insight 2011 page 3
  • 4. Perpetrators of security events and their weapons Are there perpetrators who target proportionally more women or men? Are there differences in the weapons used against men and women? Graph 3 shows the differences in the proportion of violent acts against men and women by perpetrator (state military, non-state actors, law enforcement bodies, officials, and civilians) and the weapons they use (firearms, explosives, easily accessible weapons, or no weapons at all). The findings suggest that women are particularly vulnerable to security events perpetrated by criminals and civilians (including employees, former employees or beneficiaries of programmes) and administrative decisions by the host authorities that affect the agency’s ability to continue its work unhindered. Those perpetrators who use weapons against women make greater use of easily accessible weapons (such as knives or sticks), but many perpetrators of violence against female aid workers use no weapons at all. Men bear the brunt of security events for which state militaries are responsible and are proportionally more often the target of non-state actors. They are also proportionally more often present during events in which explosives or firearms affect an aid agency. These findings likely explain why male victims experience the higher rates of injury and death, as shown in graph 2. Graphs 3a and b Differences in proportion of perpetrator categories targeting men and women and the weapon types used in security events against men and women Environments in which security events take place Are there locations where women are more frequently victimized during security events than men? Graph 4 shows the differences in the proportion to which security events affect men or women by location (urban and rural areas, while traveling, or at workplace or residence) and via mode of communication. The graph indicates that women experience proportionally more security events in urban areas and at their residence, place of work (such as office or project site) or organizational compound. They also receive proportionally more threats via phone, SMS, email or by letter than men. Men, by contrast, are proportionally more frequently victimized in rural areas and while travelling on the road or on water. www.insecurityinsight.org © Insecurity Insight 2011 page 4
  • 5. Graph 4 Differences in proportion of security events affecting men and women in defined environments Regional differences Are there regions in the world where more men are affected by security events than women? Graph 5 shows regional groupings of security events and highlights that men are proportionally more affected by events in the Middle Eastiv and Asiav while women are proportionally more frequently affected in Africavi and Latin Americavii . Individually, however, countries show only very small differences to the extent to which men or women are affected by security events, with the exception of Afghanistan, where men appear to be more vulnerable. Graph 5 Differences in proportion of security events affecting men and women in different regions of the world www.insecurityinsight.org © Insecurity Insight 2011 page 5
  • 6. Security events and the impact on the delivery of aid Are there differences in the operational consequences of security events that victimize men or women? Do humanitarian agencies make different operational decisions that affect the delivery of aid following security events that affect men or women? The initial data analysis suggests that security events that affect men have a greater impact on the delivery of aid than events that affect women. Agencies are more likely to make operational decisions, such as the restriction of staff movement, program closure or withdrawal, that negatively affect the delivery of aid following security events that affect men (2.3%). Security events that force agencies to close programs or withdraw, such as a forced closure of programs or extensive damage to facilities, are even more common after security events that affect men (5.0% more common). Graph 6 Difference in proportion of security events affecting men and women that impact the delivery of aid Percentages refer to the difference in the number of security events that affect men and women that led to changes in an agency’s ability to deliver aid What does this first look at the data tell us and what do the findings mean? All types of security events clearly affect both men and women. Based on available data, however, a higher proportion of men face specific vulnerabilities that proportionally fewer women experience and vice versa. The analysis here suggests that women are more vulnerable to a range of lesser security events such as crime and threats, particularly those in urban areas and places where they ought to feel safe (such as residences and work spaces). Men, on the other hand, experience a higher proportion of two types of serious security events: those involving lethal weapons and those that occur frequently on the road, meaning they take place outside of a defined work environment, such as an office or compound. For kidnappings, little difference exists between men and women’s vulnerability. Are these observed patterns primarily influenced by a victim’s sex or could other factors contribute to the observed patterns? This question is impossible to answer without further information and analysis. The initial finding that security events that affect men have a greater impact on the delivery of aid generates more questions than insight. Several explanations are possible. The finding could reflect the more serious nature of events affecting a greater proportion of men, such as violent deaths or the context of active fighting. It could potentially point to an attitude that sees women as naturally vulnerable and men’s victimisation as an indication of serious risk for future work. It is also possible that reporting inconsistencies about the consequences of events on the delivery www.insecurityinsight.org © Insecurity Insight 2011 page 6
  • 7. of aid are responsible for this finding rather than actual differences in operational procedures or decisions. Again, better information and further analysis is necessary. In thinking about gender and individual agency experiences, reporting practices, and security management, those responsible for security may want to consider the following questions: • Does your agency systematically record whether the victim was a man or woman? Is this information available (e.g., to Insecurity Insight or via other information sharing mechanisms) for further analysis? • Do the observed profiles discussed in this paper fit the overall pattern you observe for your organization? If not, where do you see differences? • Do you see connections, such as expatriate status or particular job position, that could explain how particular types of security events affect women or men? Would your agency consider making more information available of the type of job held by a victim within the agency (e.g., within particular categories such as driver, guard, office worker, programme staff, head of office etc.) to facilitate this type of analysis? • What other factors might influence vulnerabilities for men and women, in addition to gender? • What are the types of security incidents that lead to operational decisions that affect service delivery? Do you see any reason why security events affecting men might be regarded as indicating higher risk to operations? What other structural contexts may explain this finding? This paper presents a first look using incomplete data, and describes tentative findings intended as the beginning of a process of more comprehensive gender analysis of security events. Preliminary analysis suggests particular patterns for further examination, using both quantitative and qualitative methods. It is only in systematically collecting more complete information about gender that we will be better able to answer questions about the differential risks that men and women face in the field. i The database contains a total of 1,224 events but only 615 of these affected staff members (professional and support staff such as drivers) rather than infrastructure, operations or beneficiaries. ii A victim was classified as ‘most likely male’ based on a masculine first name or when the report specified that the victim worked as a security guard or driver, since these are male-dominated professions. iii A victim was classified as ‘most likely female’ based on a feminine first name, the profession (e.g., midwife), the fact that the thief stole a ‘handbag’, or based on the tick-box information in a report submitted by a partner agency that a ‘female was involved’. iv Included countries are: Iran, Iraq, Jordan, Occupied Palestinian Territories and Yemen. v Included countries are: Afghanistan, Bangladesh, East Timor, Indonesia, Kyrgyzstan, Nepal, Pakistan, Philippines, Papua New Guinea, Sri Lanka, Vietnam and Thailand. vi Included countries are: Angola, Burundi, Cameron, Central African Republic, Chad, Darfur, DRC, Ethiopia, Gambia, Kenya, Liberia, Madagascar, Malawi, Mali, Mauritania, Mozambique, Niger, North Sudan, Rwanda, Senegal, Sierra Leone, Somalia, South Africa, South Sudan, Tanzania, Uganda and Zimbabwe. vii Included countries are: Bolivia, Colombia, Dominican Republic, Guatemala, Haiti, Honduras, Lima, Mexico and Nicaragua. www.insecurityinsight.org © Insecurity Insight 2011 page 7