Changes between Version 22 and Version 23 of BluePrint/SecurityManagement

11/25/13 20:29:10 (11 years ago)



  • BluePrint/SecurityManagement

    v22 v23  
    44== Introduction ==
    6 "In the last decade, lethal attacks against humanitarian personnel have tripled, reaching over 100 deaths per year." ''Delivering aid in risky environments: what works?'' UN OCHA 12 April 2011 At present there does not appear to be any purpose designed software that is easy to use and deploy for the security tracking of volunteers/staff members operating in hostile environments. Building on the Volunteer Module the Security Management Module would enable the humanitarian community "to stay and deliver."
     6= !BluePrint: <Name of the solution> =
     9== Introduction ==
     10<Briefly describe the solution?>
     11<What problem is this solution solving?>
     12<How will this solution add value to Sahana?>
     13<Name any similar existing solutions>
    9 == Description ==
     15== Stakeholders ==
     16<Who will be the users of the solution?>
     17<Who else will be affected by this solution? eg. Developers, Users of Existing Functionality that may be changed?>
     18<How will stakeholders be affected?>
     19Tip: Engage these stakeholders in the development of your !BluePrint.
    11 Mary a UNDSS Security Officer in a city in a developing country is ordered to concentrate all staff from various Agencies, Funds and Programs at a secure location due to widespread rioting. Peter a staff member with Agency X is reported as not having arrived at the concentration point. Peter looks in the Sahana Eden Security Management Module and is able to find out who the Staff Member's supervisor is. Mary contacts and  confirms with the supervisor that the staff member is indeed in country and not on leave. Further Mary finds that the staff member should be at home. Mary prints out a sheet of paper with a photo of the staff member, a GPS reference and photograph of the entrance of her residence and a Google/Openstreetmap or sketch showing the exact location. (In many developing or war damaged cities there are no street/house numbers or road signs.) Mary is able to locate the residence and bring Peter to the concentration site.
     21== User Stories ==
     23<A good User Story should answer the following questions:>
     24<* Who the user is>
     25<* What they want the solution to do for them?>
     26<* Why they want it to do that? (goal)>
     27<eg. A <type of user> wants the solution to <do something for them> so that <can achieve a goal>.>
    13 Fred is a logistics manager with a small NGO. Fred is not a security expert but has been given security responsibilities. Fred needs a means of keeping track of staff/volunteers who are in and out of the country and where they live.
    16 '''Name existing solutions, e.g. in other applications'''
    18 At the moment in the experience of the author NGO Security Officers in the field rely on:
    20 Excel/Access
    21 LibreOffice Calc/Base
    22 Bits of paper written in crayons.
    24 None of which are easy to update. They have two major points of failure:
    26 1. Staff Member/Volunteer has to provide up to date information. This needs to be easy to do. Sahana Eden can help here.
    27 2. The NGO Security Officer often has to take paper forms and manually input them into excel sheets. Depending on the technical skill of the officer this can lead to duplicate records or delays in records being updated.Sahana Eden can help reduce errors. (The author recalls in a previous mission one individual being listed as having 5 different radios and one radio being issued to 3 different people. This would cause breakdowns in communication during a time of crisis. Sahana Eden Security Management Module being a proper database should be able to reduce some of the accidental errors. (ie. A single radio call sign could only be issued to one person.)
    29 == Project Management  ==
    31 * [SecurityManagement ProjMgt Project Management]
    3229== Requirements ==
    33 <Outline the requirements here>
    34 <Group requirements in subsections, e.g. functional, non-functional, interoperability etc.>
    36 == Use-Cases ==
    37 <Describe actors and use-cases>
    38 <Describe workflows>
    39 <Include diagrams where useful>
     30<Group requirements in subsections, e.g.,, etc.>
     31< requirements>
     32<Identify different types of requirements:>
     33=== Functional ===
     34=== Non-functional ===
     36=== Interoperability ===
     37=== Standards ===
     38=== System Constraints ===
    4140== Design ==
     41<Where relevant include alternative design options>
     42=== Data Model ===
     43(e.g. EER or class diagrams)
     44=== Workflows ===
     45<Diagrams or Pseudocode>
     46=== Site Map ===
     47<for User Interface solutions>
     48=== Wireframes ===
     49<for User Interface solutions>
     50=== Technologies ===
     52== Current Implementation ==
     53<Leave open for a list of existing implementation of this solution in Sahana Eden:>
     54<*a brief description of the implementation (date/time, name, design options chosen)>
     55<*a link to the code>
     56<*list of deployments of the implementation>
     57<*links to case studies>
     58<*short analysis of achievements/problems>
    44 == Implementation ==
    45 <Leave open for a list of implementation>
     60== Planned Implementation ==
     61<List of goals for your implementations which you (include your name/github repo/IRC handle) are currently working on>
     63== Future Extensions ==
     64<List of features which could be included, but are outside of the scope of this extension>
     66== Outstanding Questions ==
     67<Questions about the features or design that haven't been (and need to be) answered>
    4769== References ==
    50 '''NGO Security Page (Good set of Links to books, websites, etc. linked to NGO Security Best Practices)'''
    52 []
    54 []
    56 A good starting point for those not familiar with NGO Security Basics would be '''Operational Security Management in Violent Environment''''''' by Koenraad Van Brabant available online at:
    58 []
    60 ''Delivering aid in risky environments: what works?'' UN OCHA
    61 [
     70<Links to external resources>
    65 BluePrints