Changes between Initial Version and Version 1 of BluePrint/SecurityManagement


Ignore:
Timestamp:
03/24/12 17:48:57 (10 years ago)
Author:
gluesniffmonkey
Comment:

--

Legend:

Unmodified
Added
Removed
Modified
  • BluePrint/SecurityManagement

    v1 v1  
     1[[TOC]]
     2= !BluePrint: Security Management Module =
     3
     4== Introduction ==
     5
     6"In the last decade, lethal attacks against humanitarian personnel have tripled, reaching over 100 deaths per year." ''Delivering aid in risky environments: what works?'' UN OCHA 12 April 2011 At present there does not appear to be any purpose designed software that is easy to use and deploy for the security tracking of volunteers/staff members operating in hostile environments. Building on the Volunteer Module the Security Management Module would enable the humanitarian community "to stay and deliver."
     7
     8
     9== Description ==
     10
     11Mary a UNDSS Security Officer in a city in a developing country is ordered to concentrate all staff from various Agencies, Funds and Programs at a secure location due to widespread rioting. Peter a staff member with Agency X is reported as not having arrived at the concentration point. Peter looks in the Sahana Eden Security Management Module and is able to find out who the Staff Member's supervisor is. Mary contacts and  confirms with the supervisor that the staff member is indeed in country and not on leave. Further Mary finds that the staff member should be at home. Mary prints out a sheet of paper with a photo of the staff member, a GPS reference and photograph of the entrance of her residence and a Google/Openstreetmap or sketch showing the exact location. (In many developing or war damaged cities there are no street/house numbers or road signs.) Mary is able to locate the residence and bring Peter to the concentration site.
     12
     13Fred is a logistics manager with a small NGO. Fred is not a security expert but has been given security responsibilities. Fred needs a means of keeping track of staff/volunteers who are in and out of the country and where they live.
     14
     15
     16'''Name existing solutions, e.g. in other applications'''
     17
     18At the moment in the experience of the author NGO Security Officers in the field rely on:
     19
     20Excel/Access
     21LibreOffice Calc/Base
     22Bits of paper written in crayons.
     23
     24None of which are easy to update. They have two major points of failure:
     25
     261. Staff Member/Volunteer has to provide up to date information. This needs to be easy to do. Sahana Eden can help here.
     272. The NGO Security Officer often has to take paper forms and manually input them into excel sheets. Depending on the technical skill of the officer this can lead to duplicate records or delays in records being updated.Sahana Eden can help reduce errors. (The author recalls in a previous mission one individual being listed as having 5 different radios and one radio being issued to 3 different people. This would cause breakdowns in communication during a time of crisis. Sahana Eden Security Management Module being a proper database should be able to reduce some of the accidental errors. (ie. A single radio call sign could only be issued to one person.)
     28
     29
     30== Requirements ==
     31<Outline the requirements here>
     32<Group requirements in subsections, e.g. functional, non-functional, interoperability etc.>
     33
     34== Use-Cases ==
     35<Describe actors and use-cases>
     36<Describe workflows>
     37<Include diagrams where useful>
     38
     39== Design ==
     40<Describe a possible design, repeat any design sections for alternative designs>
     41<Include diagrams, screen mockups and wireframes where useful>
     42
     43== Implementation ==
     44<Leave open for a list of implementation>
     45
     46== References ==
     47<Links to external resources>
     48
     49'''NGO Security Page (Good set of Links to books, websites, etc. linked to NGO Security Best Practices)'''
     50
     51[http://sites.google.com/site/ngosecurity/]
     52
     53[http://ngosecurity.blogspot.com/]
     54
     55A good starting point for those not familiar with NGO Security Basics would be '''Operational Security Management in Violent Environment''''''' by Koenraad Van Brabant available online at:
     56
     57[http://www.odihpn.org/hpn-resources/good-practice-reviews/operational-security-management-in-violent-environments-revised-edition]
     58
     59''Delivering aid in risky environments: what works?'' UN OCHA
     60[
     61http://reliefweb.int/node/395873]
     62
     63----
     64BluePrints