SlideShare a Scribd company logo
1 of 2
Download to read offline
Security in Numbers Database (SiND):
                         Monitoring actions that interfere with aid delivery

Information for Project Partners

Insecurity Insight is building a database on security incidents affecting aid delivery from media sources and
information provided by contributing partner organizations. The purpose of the database is to profile
patterns of threat and vulnerability in order to allow agencies to identify evidence-based entry points to
improve security management.

The distinguishing features of this particular initiative are:

         The database is set up to generate information on the patterns and characteristics of all
          types and degree of severity of security incidents to help identify entry points for security
          management.
The database is based on the Taback-Coupland theory of armed violence and offers unique features no
other database on security incidents currently provides. The database tracks information about who did
what to whom, when, where, and with what weapon. While the database can be used to look up global
tallies, its main aim is to provide insight into the patterns and characteristics of incidents and therefore how
to prevent them or mitigate their impact. The relational structure allows analysis of disaggregated and
aggregated categories and the possibility for customization.

Advantages of taking part in the project

By joining this project, you will gain access to data about patterns and trends of violence across agencies
and regions over time, as well as contribute to a better understanding of the threats and vulnerabilities
facing aid workers and aid operations. Your participation enables you to gain a sense of the big picture of
the patterns of violence as well as how your organization’s patterns compare to other similar organizations.
The quality and reliability of the information in the database improves with every additional agency that
joins this initiative.

By being a partner you gain:

     Access to country and regional overviews
Events are searchable by country and regions, which means your agency can request a security profile for
a country in which you are considering opening a new programme or to analyze trends in countries in which
you already work.
     Access to a broad range of type and degree of severity of incidents
The database captures different elements of the incidents ranging from contexts (e.g. crime, active conflict,
denial of access), to the effects on personnel (e.g. threats, injuries, deaths, kidnapping), impact on agency
operations (e.g. loss or theft of supplies, damage to property). The database also tracks responses to
security incidents by agencies (e.g. evacuations, withdrawal) and relevant authorities (e.g. arrest,
prosecution).
 Access to a broad range of long-term trends
The database contains media reported incidents of various types and severity. This allows for tracking for
trends over time.
     Access to aggregated information about security incidents affecting other agencies
The database abides by a strict confidentiality policy but codes the type of affected agency in generic terms
(e.g. INGO, UN Agency). This allows partners to gain access to information from other agencies while
maintaining confidentiality for all affected agencies.

By having your own data included in the database you have the option to request:

     Tailor-made data analysis of patterns, threats, and vulnerabilities
The relational structure of the database offers myriad possibilities for extracting information for further
analysis. For example, this makes it possible to compare the incident patterns of your organisation with that
of similar or different organisations (specific NGO to generic NGOs or NGO to UN or vice versa) or to
compare operations in different contexts.

In addition, you will receive copies of all non-confidential outputs from the database.

Contributing to the Project

Participating organizations contribute basic incident descriptions to this database to supplement and
complement information from public sources. Insecurity Insight will create individual Memoranda of
Understanding with interested organizations to address specific interests or concerns.

Submitting information is quick and easy. The database creates an “event catalogue” that centers on the
analysis of: Who did what to whom, when, where, and with what weapon. Basic information on these
factors is all that is needed. Agencies can choose between different methods of contributing information to
suit different working practices in terms of information storage and frequency of submission.
Information can be submitted:

      in the form of incident descriptions using plain English, French (or any other language after prior
       consultation)
      using a spreadsheet and codebook provided by Insecurity Insight

Agencies can decide on their own preferred frequency in which to submit information e.g. after an event
occurred, at the end of every week / month / quarter / calendar year etc.


                  Examples of event descriptions needed for inclusion in the database

  On the morning of 4 August, five armed men stopped a clearly marked car at a checkpoint outside
  the capital Mogadishu (Somalia), shot the driver (a local employee) and took three staff members
  hostage, one expatriate and two locals.

  During the night of 5 to 6 September, a group of approximately 10 armed men wearing military
  fatigues entered the compound of our operations in Duja and took five computers and most of the
  medical and food supplies stored in the warehouse. One local staff member was injured.


If you are interested in becoming a partner in the project, please contact Christina Wille at
Christina.Wille@insecurityinsight.org. We look forward to discussing how you might help build and benefit
from the database, with only a minimal investment of time and energy.

More Related Content

Similar to Security in Numbers Database (SiND): Monitoring Actions that Interfere with Aid Delivery

Practical and Actionable Threat Intelligence Collection
Practical and Actionable Threat Intelligence CollectionPractical and Actionable Threat Intelligence Collection
Practical and Actionable Threat Intelligence CollectionSeamus Tuohy
 
ENG 132Evaluation Argument One Flew Over the Cuckoo’s NestSp.docx
ENG 132Evaluation Argument  One Flew Over the Cuckoo’s NestSp.docxENG 132Evaluation Argument  One Flew Over the Cuckoo’s NestSp.docx
ENG 132Evaluation Argument One Flew Over the Cuckoo’s NestSp.docxgidmanmary
 
Automated Emerging Cyber Threat Identification and Profiling Based on Natural...
Automated Emerging Cyber Threat Identification and Profiling Based on Natural...Automated Emerging Cyber Threat Identification and Profiling Based on Natural...
Automated Emerging Cyber Threat Identification and Profiling Based on Natural...Shakas Technologies
 
Brian Wrote There is a wide range of cybersecurity initiatives .docx
Brian Wrote There is a wide range of cybersecurity initiatives .docxBrian Wrote There is a wide range of cybersecurity initiatives .docx
Brian Wrote There is a wide range of cybersecurity initiatives .docxhartrobert670
 
TERRORIST WATCHER: AN INTERACTIVE WEBBASED VISUAL ANALYTICAL TOOL OF TERRORIS...
TERRORIST WATCHER: AN INTERACTIVE WEBBASED VISUAL ANALYTICAL TOOL OF TERRORIS...TERRORIST WATCHER: AN INTERACTIVE WEBBASED VISUAL ANALYTICAL TOOL OF TERRORIS...
TERRORIST WATCHER: AN INTERACTIVE WEBBASED VISUAL ANALYTICAL TOOL OF TERRORIS...IJDKP
 
TERRORIST WATCHER: AN INTERACTIVE WEBBASED VISUAL ANALYTICAL TOOL OF TERRORIS...
TERRORIST WATCHER: AN INTERACTIVE WEBBASED VISUAL ANALYTICAL TOOL OF TERRORIS...TERRORIST WATCHER: AN INTERACTIVE WEBBASED VISUAL ANALYTICAL TOOL OF TERRORIS...
TERRORIST WATCHER: AN INTERACTIVE WEBBASED VISUAL ANALYTICAL TOOL OF TERRORIS...IJDKP
 
Intelligence support to Non-Governmental Organisations (NGOs)
Intelligence support to Non-Governmental Organisations (NGOs)Intelligence support to Non-Governmental Organisations (NGOs)
Intelligence support to Non-Governmental Organisations (NGOs)Michael McCabe
 
[M3A1] Data Analysis and Interpretation Specialization
[M3A1] Data Analysis and Interpretation Specialization [M3A1] Data Analysis and Interpretation Specialization
[M3A1] Data Analysis and Interpretation Specialization Andrea Rubio
 
Project 4 Threat Analysis and ExploitationTranscript (backgroun.docx
Project 4 Threat Analysis and ExploitationTranscript (backgroun.docxProject 4 Threat Analysis and ExploitationTranscript (backgroun.docx
Project 4 Threat Analysis and ExploitationTranscript (backgroun.docxstilliegeorgiana
 
A Research Study On Using A Computer Program
A Research Study On Using A Computer ProgramA Research Study On Using A Computer Program
A Research Study On Using A Computer ProgramAimee Brown
 
The 911 Commission Report concluded that the failure of the intelli.docx
The 911 Commission Report concluded that the failure of the intelli.docxThe 911 Commission Report concluded that the failure of the intelli.docx
The 911 Commission Report concluded that the failure of the intelli.docxSANSKAR20
 
NCRIC Analysis of Cyber Security Emergency Management
NCRIC Analysis of Cyber Security Emergency ManagementNCRIC Analysis of Cyber Security Emergency Management
NCRIC Analysis of Cyber Security Emergency ManagementDavid Sweigert
 
Please don’t give me a two to three sentence replies. It has to lo.docx
Please don’t give me a two to three sentence replies. It has to lo.docxPlease don’t give me a two to three sentence replies. It has to lo.docx
Please don’t give me a two to three sentence replies. It has to lo.docxmattjtoni51554
 
Interset-advanced threat detection wp
Interset-advanced threat detection wpInterset-advanced threat detection wp
Interset-advanced threat detection wpCMR WORLD TECH
 
Matt LaVigna - Cyber Security - NCFTA 2017
Matt LaVigna - Cyber Security - NCFTA 2017Matt LaVigna - Cyber Security - NCFTA 2017
Matt LaVigna - Cyber Security - NCFTA 2017Invest Northern Ireland
 
Empowering Cyber Threat Intelligence with AI
Empowering Cyber Threat Intelligence with AIEmpowering Cyber Threat Intelligence with AI
Empowering Cyber Threat Intelligence with AIIJCI JOURNAL
 
Southwestern Business Administration JournalVolume 16 Is.docx
Southwestern Business Administration JournalVolume 16  Is.docxSouthwestern Business Administration JournalVolume 16  Is.docx
Southwestern Business Administration JournalVolume 16 Is.docxrosemariebrayshaw
 
150 words agree or disagreeThis week we discussed data mining an.docx
150 words agree or disagreeThis week we discussed data mining an.docx150 words agree or disagreeThis week we discussed data mining an.docx
150 words agree or disagreeThis week we discussed data mining an.docxdrennanmicah
 
COLLABORATIVE DEFENCE FOR DISTRIBUTED ATTACKS (CASE STUDY OF PALESTINIAN INFO...
COLLABORATIVE DEFENCE FOR DISTRIBUTED ATTACKS (CASE STUDY OF PALESTINIAN INFO...COLLABORATIVE DEFENCE FOR DISTRIBUTED ATTACKS (CASE STUDY OF PALESTINIAN INFO...
COLLABORATIVE DEFENCE FOR DISTRIBUTED ATTACKS (CASE STUDY OF PALESTINIAN INFO...IJNSA Journal
 
wp-us-cities-exposed
wp-us-cities-exposedwp-us-cities-exposed
wp-us-cities-exposedNumaan Huq
 

Similar to Security in Numbers Database (SiND): Monitoring Actions that Interfere with Aid Delivery (20)

Practical and Actionable Threat Intelligence Collection
Practical and Actionable Threat Intelligence CollectionPractical and Actionable Threat Intelligence Collection
Practical and Actionable Threat Intelligence Collection
 
ENG 132Evaluation Argument One Flew Over the Cuckoo’s NestSp.docx
ENG 132Evaluation Argument  One Flew Over the Cuckoo’s NestSp.docxENG 132Evaluation Argument  One Flew Over the Cuckoo’s NestSp.docx
ENG 132Evaluation Argument One Flew Over the Cuckoo’s NestSp.docx
 
Automated Emerging Cyber Threat Identification and Profiling Based on Natural...
Automated Emerging Cyber Threat Identification and Profiling Based on Natural...Automated Emerging Cyber Threat Identification and Profiling Based on Natural...
Automated Emerging Cyber Threat Identification and Profiling Based on Natural...
 
Brian Wrote There is a wide range of cybersecurity initiatives .docx
Brian Wrote There is a wide range of cybersecurity initiatives .docxBrian Wrote There is a wide range of cybersecurity initiatives .docx
Brian Wrote There is a wide range of cybersecurity initiatives .docx
 
TERRORIST WATCHER: AN INTERACTIVE WEBBASED VISUAL ANALYTICAL TOOL OF TERRORIS...
TERRORIST WATCHER: AN INTERACTIVE WEBBASED VISUAL ANALYTICAL TOOL OF TERRORIS...TERRORIST WATCHER: AN INTERACTIVE WEBBASED VISUAL ANALYTICAL TOOL OF TERRORIS...
TERRORIST WATCHER: AN INTERACTIVE WEBBASED VISUAL ANALYTICAL TOOL OF TERRORIS...
 
TERRORIST WATCHER: AN INTERACTIVE WEBBASED VISUAL ANALYTICAL TOOL OF TERRORIS...
TERRORIST WATCHER: AN INTERACTIVE WEBBASED VISUAL ANALYTICAL TOOL OF TERRORIS...TERRORIST WATCHER: AN INTERACTIVE WEBBASED VISUAL ANALYTICAL TOOL OF TERRORIS...
TERRORIST WATCHER: AN INTERACTIVE WEBBASED VISUAL ANALYTICAL TOOL OF TERRORIS...
 
Intelligence support to Non-Governmental Organisations (NGOs)
Intelligence support to Non-Governmental Organisations (NGOs)Intelligence support to Non-Governmental Organisations (NGOs)
Intelligence support to Non-Governmental Organisations (NGOs)
 
[M3A1] Data Analysis and Interpretation Specialization
[M3A1] Data Analysis and Interpretation Specialization [M3A1] Data Analysis and Interpretation Specialization
[M3A1] Data Analysis and Interpretation Specialization
 
Project 4 Threat Analysis and ExploitationTranscript (backgroun.docx
Project 4 Threat Analysis and ExploitationTranscript (backgroun.docxProject 4 Threat Analysis and ExploitationTranscript (backgroun.docx
Project 4 Threat Analysis and ExploitationTranscript (backgroun.docx
 
A Research Study On Using A Computer Program
A Research Study On Using A Computer ProgramA Research Study On Using A Computer Program
A Research Study On Using A Computer Program
 
The 911 Commission Report concluded that the failure of the intelli.docx
The 911 Commission Report concluded that the failure of the intelli.docxThe 911 Commission Report concluded that the failure of the intelli.docx
The 911 Commission Report concluded that the failure of the intelli.docx
 
NCRIC Analysis of Cyber Security Emergency Management
NCRIC Analysis of Cyber Security Emergency ManagementNCRIC Analysis of Cyber Security Emergency Management
NCRIC Analysis of Cyber Security Emergency Management
 
Please don’t give me a two to three sentence replies. It has to lo.docx
Please don’t give me a two to three sentence replies. It has to lo.docxPlease don’t give me a two to three sentence replies. It has to lo.docx
Please don’t give me a two to three sentence replies. It has to lo.docx
 
Interset-advanced threat detection wp
Interset-advanced threat detection wpInterset-advanced threat detection wp
Interset-advanced threat detection wp
 
Matt LaVigna - Cyber Security - NCFTA 2017
Matt LaVigna - Cyber Security - NCFTA 2017Matt LaVigna - Cyber Security - NCFTA 2017
Matt LaVigna - Cyber Security - NCFTA 2017
 
Empowering Cyber Threat Intelligence with AI
Empowering Cyber Threat Intelligence with AIEmpowering Cyber Threat Intelligence with AI
Empowering Cyber Threat Intelligence with AI
 
Southwestern Business Administration JournalVolume 16 Is.docx
Southwestern Business Administration JournalVolume 16  Is.docxSouthwestern Business Administration JournalVolume 16  Is.docx
Southwestern Business Administration JournalVolume 16 Is.docx
 
150 words agree or disagreeThis week we discussed data mining an.docx
150 words agree or disagreeThis week we discussed data mining an.docx150 words agree or disagreeThis week we discussed data mining an.docx
150 words agree or disagreeThis week we discussed data mining an.docx
 
COLLABORATIVE DEFENCE FOR DISTRIBUTED ATTACKS (CASE STUDY OF PALESTINIAN INFO...
COLLABORATIVE DEFENCE FOR DISTRIBUTED ATTACKS (CASE STUDY OF PALESTINIAN INFO...COLLABORATIVE DEFENCE FOR DISTRIBUTED ATTACKS (CASE STUDY OF PALESTINIAN INFO...
COLLABORATIVE DEFENCE FOR DISTRIBUTED ATTACKS (CASE STUDY OF PALESTINIAN INFO...
 
wp-us-cities-exposed
wp-us-cities-exposedwp-us-cities-exposed
wp-us-cities-exposed
 

More from Insecurity Insight

How do security events affecting humanitarian agencies differ between rural a...
How do security events affecting humanitarian agencies differ between rural a...How do security events affecting humanitarian agencies differ between rural a...
How do security events affecting humanitarian agencies differ between rural a...Insecurity Insight
 
Aid, Gender and Security: The Gendered Nature of Security Events Affecting Ai...
Aid, Gender and Security: The Gendered Nature of Security Events Affecting Ai...Aid, Gender and Security: The Gendered Nature of Security Events Affecting Ai...
Aid, Gender and Security: The Gendered Nature of Security Events Affecting Ai...Insecurity Insight
 
Is Terrorism an Issue for Humanitarian Agencies?
Is Terrorism an Issue for Humanitarian Agencies?Is Terrorism an Issue for Humanitarian Agencies?
Is Terrorism an Issue for Humanitarian Agencies?Insecurity Insight
 
Electing to Rape: Sexual Terror in Mugabe's Zimbabwe
Electing to Rape: Sexual Terror in Mugabe's ZimbabweElecting to Rape: Sexual Terror in Mugabe's Zimbabwe
Electing to Rape: Sexual Terror in Mugabe's ZimbabweInsecurity Insight
 
Sixteen Country Study: Health Care in Danger
Sixteen Country Study: Health Care in DangerSixteen Country Study: Health Care in Danger
Sixteen Country Study: Health Care in DangerInsecurity Insight
 
Explosive Violence: The Problem of Explosive Weapons
Explosive Violence: The Problem of Explosive WeaponsExplosive Violence: The Problem of Explosive Weapons
Explosive Violence: The Problem of Explosive WeaponsInsecurity Insight
 
Humanitarian Exchange: The Six Ws of Security Policy Making (p. 6-7)
Humanitarian Exchange: The Six Ws of Security Policy Making (p. 6-7)Humanitarian Exchange: The Six Ws of Security Policy Making (p. 6-7)
Humanitarian Exchange: The Six Ws of Security Policy Making (p. 6-7)Insecurity Insight
 
Security of Journalists: Making the Case for Modelling Armed Violence as a Me...
Security of Journalists: Making the Case for Modelling Armed Violence as a Me...Security of Journalists: Making the Case for Modelling Armed Violence as a Me...
Security of Journalists: Making the Case for Modelling Armed Violence as a Me...Insecurity Insight
 

More from Insecurity Insight (8)

How do security events affecting humanitarian agencies differ between rural a...
How do security events affecting humanitarian agencies differ between rural a...How do security events affecting humanitarian agencies differ between rural a...
How do security events affecting humanitarian agencies differ between rural a...
 
Aid, Gender and Security: The Gendered Nature of Security Events Affecting Ai...
Aid, Gender and Security: The Gendered Nature of Security Events Affecting Ai...Aid, Gender and Security: The Gendered Nature of Security Events Affecting Ai...
Aid, Gender and Security: The Gendered Nature of Security Events Affecting Ai...
 
Is Terrorism an Issue for Humanitarian Agencies?
Is Terrorism an Issue for Humanitarian Agencies?Is Terrorism an Issue for Humanitarian Agencies?
Is Terrorism an Issue for Humanitarian Agencies?
 
Electing to Rape: Sexual Terror in Mugabe's Zimbabwe
Electing to Rape: Sexual Terror in Mugabe's ZimbabweElecting to Rape: Sexual Terror in Mugabe's Zimbabwe
Electing to Rape: Sexual Terror in Mugabe's Zimbabwe
 
Sixteen Country Study: Health Care in Danger
Sixteen Country Study: Health Care in DangerSixteen Country Study: Health Care in Danger
Sixteen Country Study: Health Care in Danger
 
Explosive Violence: The Problem of Explosive Weapons
Explosive Violence: The Problem of Explosive WeaponsExplosive Violence: The Problem of Explosive Weapons
Explosive Violence: The Problem of Explosive Weapons
 
Humanitarian Exchange: The Six Ws of Security Policy Making (p. 6-7)
Humanitarian Exchange: The Six Ws of Security Policy Making (p. 6-7)Humanitarian Exchange: The Six Ws of Security Policy Making (p. 6-7)
Humanitarian Exchange: The Six Ws of Security Policy Making (p. 6-7)
 
Security of Journalists: Making the Case for Modelling Armed Violence as a Me...
Security of Journalists: Making the Case for Modelling Armed Violence as a Me...Security of Journalists: Making the Case for Modelling Armed Violence as a Me...
Security of Journalists: Making the Case for Modelling Armed Violence as a Me...
 

Recently uploaded

Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxAnaBeatriceAblay2
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 

Recently uploaded (20)

Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 

Security in Numbers Database (SiND): Monitoring Actions that Interfere with Aid Delivery

  • 1. Security in Numbers Database (SiND): Monitoring actions that interfere with aid delivery Information for Project Partners Insecurity Insight is building a database on security incidents affecting aid delivery from media sources and information provided by contributing partner organizations. The purpose of the database is to profile patterns of threat and vulnerability in order to allow agencies to identify evidence-based entry points to improve security management. The distinguishing features of this particular initiative are:  The database is set up to generate information on the patterns and characteristics of all types and degree of severity of security incidents to help identify entry points for security management. The database is based on the Taback-Coupland theory of armed violence and offers unique features no other database on security incidents currently provides. The database tracks information about who did what to whom, when, where, and with what weapon. While the database can be used to look up global tallies, its main aim is to provide insight into the patterns and characteristics of incidents and therefore how to prevent them or mitigate their impact. The relational structure allows analysis of disaggregated and aggregated categories and the possibility for customization. Advantages of taking part in the project By joining this project, you will gain access to data about patterns and trends of violence across agencies and regions over time, as well as contribute to a better understanding of the threats and vulnerabilities facing aid workers and aid operations. Your participation enables you to gain a sense of the big picture of the patterns of violence as well as how your organization’s patterns compare to other similar organizations. The quality and reliability of the information in the database improves with every additional agency that joins this initiative. By being a partner you gain:  Access to country and regional overviews Events are searchable by country and regions, which means your agency can request a security profile for a country in which you are considering opening a new programme or to analyze trends in countries in which you already work.  Access to a broad range of type and degree of severity of incidents The database captures different elements of the incidents ranging from contexts (e.g. crime, active conflict, denial of access), to the effects on personnel (e.g. threats, injuries, deaths, kidnapping), impact on agency operations (e.g. loss or theft of supplies, damage to property). The database also tracks responses to security incidents by agencies (e.g. evacuations, withdrawal) and relevant authorities (e.g. arrest, prosecution).
  • 2.  Access to a broad range of long-term trends The database contains media reported incidents of various types and severity. This allows for tracking for trends over time.  Access to aggregated information about security incidents affecting other agencies The database abides by a strict confidentiality policy but codes the type of affected agency in generic terms (e.g. INGO, UN Agency). This allows partners to gain access to information from other agencies while maintaining confidentiality for all affected agencies. By having your own data included in the database you have the option to request:  Tailor-made data analysis of patterns, threats, and vulnerabilities The relational structure of the database offers myriad possibilities for extracting information for further analysis. For example, this makes it possible to compare the incident patterns of your organisation with that of similar or different organisations (specific NGO to generic NGOs or NGO to UN or vice versa) or to compare operations in different contexts. In addition, you will receive copies of all non-confidential outputs from the database. Contributing to the Project Participating organizations contribute basic incident descriptions to this database to supplement and complement information from public sources. Insecurity Insight will create individual Memoranda of Understanding with interested organizations to address specific interests or concerns. Submitting information is quick and easy. The database creates an “event catalogue” that centers on the analysis of: Who did what to whom, when, where, and with what weapon. Basic information on these factors is all that is needed. Agencies can choose between different methods of contributing information to suit different working practices in terms of information storage and frequency of submission. Information can be submitted:  in the form of incident descriptions using plain English, French (or any other language after prior consultation)  using a spreadsheet and codebook provided by Insecurity Insight Agencies can decide on their own preferred frequency in which to submit information e.g. after an event occurred, at the end of every week / month / quarter / calendar year etc. Examples of event descriptions needed for inclusion in the database On the morning of 4 August, five armed men stopped a clearly marked car at a checkpoint outside the capital Mogadishu (Somalia), shot the driver (a local employee) and took three staff members hostage, one expatriate and two locals. During the night of 5 to 6 September, a group of approximately 10 armed men wearing military fatigues entered the compound of our operations in Duja and took five computers and most of the medical and food supplies stored in the warehouse. One local staff member was injured. If you are interested in becoming a partner in the project, please contact Christina Wille at Christina.Wille@insecurityinsight.org. We look forward to discussing how you might help build and benefit from the database, with only a minimal investment of time and energy.