The Security Needs Assessment Protocol


Book Description

"This report addresses the effectiveness of field operations. These may take place across an entire state, but they are most commonly carried out at the sub-state level and the area of operation may or may not cross international borders. These areas may be villages, towns or cities, or they might be municipalities, counties or chiefdoms."--Introd.




Conflict and Fragility Armed Violence Reduction Enabling Development


Book Description

Each year, 740 000 people die as a result of armed violence. This publication will help the international community to understand the dynamics of armed violence and outlines what can be done to reduce it.




The Security Risk Assessment Handbook


Book Description

The Security Risk Assessment Handbook: A Complete Guide for Performing Security Risk Assessments provides detailed insight into precisely how to conduct an information security risk assessment. Designed for security professionals and their customers who want a more in-depth understanding of the risk assessment process, this volume contains real-wor




Rapid Health Assessment Protocols for Emergencies


Book Description

This book provides a collection of ten protocols for conducting rapid health assessments in the immediate aftermath of different types of emergencies. Noting the vital importance of rapid and accurate information in the earliest stage of an emergency, the protocols respond to the urgent need for common standardized technical tools for assessing damage, gauging health risks, and gathering the information immediately needed by decision-makers at the national and international level. The protocols were prepared by WHO in collaboration with a large number of international agencies and experts with broad experience in the field of emergency management. Although all protocols follow a common format, each is specific to the circumstances, potential hazards, and immediate information needs that characterize a distinct type of emergency. Emphasis is placed on the exact information needed, the best sources of data and methods for rapid collection, and the specific questions that need to be answered in order to draw initial conclusions and direct immediate actions. Although the advantages of using experienced assessments teams are stressed, the book also explains how the protocols can be used to train general health workers as part of emergency preparedness. The book opens with an introductory protocol covering the aims and methods, responsibilities, complexities, and inherent difficulties of rapid health assessments. Addressed to health authorities as well as assessment teams, the chapter also includes abundant advice on preparedness for emergencies. Details range from the comparative need for speed in different types of emergencies, through a suggested format for presenting the results of assessments, to a list of common logistic, organizational, and technical errors. Advice on the best working practices, including ways to avoid being an "emergency tourist", is also provided. Against this background, the additional nine protocols are presented according to a common format which covers the purpose of the assessment, preparedness, the steps to follow during the assessment, assessing the impact on health, assessing local response capacity and immediate needs, and presenting results. A general protocol on epidemics of infectious origin is followed by protocols specific to meningitis outbreaks, outbreaks of viral haemorrhagic fever, including yellow fever, and outbreaks of acute diarrhoeal disease, with information specific to dysentery and cholera. Sudden-impact natural disasters are covered in the next protocol, which includes a day-by-day list of information priorities for different stages of the disaster. A protocol dealing with sudden population displacements offers guidelines for conducting rapid health assessments in all emergencies caused by sudden displacement of refugees or population groups within a country. Included are a sample checklist for rapid assessments and a sample form for weekly reports on morbidity and mortality. Subsequent protocols deal with the special situations of nutritional emergencies and chemical emergencies, including those caused by food contaminated with chemicals or toxins. The final protocol addresses the difficult task of conducting assessments in complex emergencies in which the cause of the emergency, as well as the assistance to the afflicted, is complicated by intense levels of political considerations. The protocol includes a form which has recently been used for rapid health assessment at local level in Bosnia and Herzegovnia. The book concludes with a brief summary of survey techniques, followed by a tabular presentation of reference values for assessing needs, hazards, and logistic requirements in developing countries.




A Guide to Assessing Needs


Book Description

Making informed decisions is the essential beginning to any successful development project. Before the project even begins, you can use needs assessment approaches to guide your decisions. This book is filled with practical strategies that can help you define the desired results and select the most appropriate activities for achieving them.




Information Security Risk Assessment Toolkit


Book Description

In order to protect company's information assets such as sensitive customer records, health care records, etc., the security practitioner first needs to find out: what needs protected, what risks those assets are exposed to, what controls are in place to offset those risks, and where to focus attention for risk treatment. This is the true value and purpose of information security risk assessments. Effective risk assessments are meant to provide a defendable analysis of residual risk associated with your key assets so that risk treatment options can be explored. Information Security Risk Assessment Toolkit gives you the tools and skills to get a quick, reliable, and thorough risk assessment for key stakeholders. Based on authors' experiences of real-world assessments, reports, and presentations Focuses on implementing a process, rather than theory, that allows you to derive a quick and valuable assessment Includes a companion web site with spreadsheets you can utilize to create and maintain the risk assessment







Network Security Assessment


Book Description

Covers offensive technologies by grouping and analyzing them at a higher level--from both an offensive and defensive standpoint--helping you design and deploy networks that are immune to offensive exploits, tools, and scripts. Chapters focus on the components of your network, the different services yourun, and how they can be attacked. Each chapter concludes with advice to network defenders on how to beat the attacks.




Researching Violence in Africa


Book Description

Researching violence and conflict can be challenging for a variety of reasons, including security risks to researchers and informants, restricted or lack of access to informants and field sites, and poor reliability of official data. Traditional methodological approaches may need to be adapted, and new methods may be called for. In addition, such research carries ethical challenges about representation of informants and information and possible use of the research for harmful ends. This book, drawing on research conducted throughout Africa in conflict zones and other insecure environments, considers the everyday dilemmas researchers face. It provides essential contributions to ongoing challenging debates about the use of alternative and mixed methods in social science research.




Handbook of Forensic Mental Health


Book Description

This is a comprehensive reference book on the subject of forensic mental health, looking at what forensic mental health is and its assessment, management and treatment. It focuses on key topics and the issues underpinning them in contemporary society. The book includes: an account of the historical development of forensic mental health, along with a description of the three mental health systems operating in the UK an in-depth analysis of the forensic mental health process and system, including an analysis of the different systems applied for juveniles and adults an examination of the main issues in forensic mental health including sex offending, personality disorders and addiction a breakdown of the key skills needed for forensic mental health practice. This is an authoritative reference book which will be a crucial text for practitioners, academics and students in the forensic mental health field.