BEYOND SECURITY PLANNING: TOWARDS A MODEL OF SECURITY MANAGEMENT



Similar documents
Security Risk Assessment Tool

Annex 1: Assesing risk: threats, vulnerabilities and capacities

Human Resource Planning - An Analytical Study

Conflict management Funmi Olonisaki King s College London

D 1. Working with people Develop productive working relationships with colleagues. Unit Summary. effective performance.

APPROVED BY INTERACTION S BOARD ON JUNE 14, Suggested Guidance for Implementing InterAction s Minimum Operating Security Standards

Human mobility and displacement tracking

STRESS POLICY. Stress Policy. Head of Valuation Services. Review History

The Roles of Human Resources in Organizational Crisis Management

Copyright 2013 Hendry Performance Development Ltd - All Rights Reserved. Performance Management & Development

29 Human Resource Planning

Security Council. United Nations S/2008/434

CONSULTANT - CALL FOR APPLICATIONS: EXPERTS AND TRAINERS ROSTER (UN WOMEN GLOBAL)

UNIDO. Competencies. Strengthening Organizational Core Values and Managerial Capabilities

Procurement Programmes & Projects P3M3 v2.1 Self-Assessment Instructions and Questionnaire. P3M3 Project Management Self-Assessment

Shankar Gawade VP IT INFRASTRUCTURE ENAM SECURITIES PVT. LTD.

Security Audits AN EISF GUIDE FOR NON-GOVERNMENTAL ORGANISATIONS CHRISTOPHER FINUCANE FOR EUROPEAN INTERAGENCY SECURITY FORUM.

GENERIC TERMS OF REFERENCE Environmental Field Advisor (EFA) OCHA Environmental Emergency Section (EES)

Policy Guide and Template. Safety & Security

Basic Management Principles. Author: Jack E. Fincham, PhD, RPh Dean & Professor University of Kansas School of Pharmacy

NGO security coordination and other sources of support WITHIN FIRST 1-2 WEEKS. Office/compound/ facility security

JOURNAL OF OBJECT TECHNOLOGY

Gender mainstreaming and peacekeeping operations Online Course Syllabus

2 INFORMATION/DATA MANAGEMENT STRATEGY

REVEALED: THE BLUEPRINT FOR BUSINESS SUCCESS Find out if you are achieving your full growth potential

Humanitarian Protection

Who needs humans to run computers? Role of Big Data and Analytics in running Tomorrow s Computers illustrated with Today s Examples

Continuous context-specific protection analysis

PROGRAMMES ADVISER HUMANITARIAN ISSUES MSF UK Location: London Permanent position: 40 hours / week

2.0 Information Management and the Humanitarian Context

Islamic Republic of Afghanistan, Post Disaster Need Assessment (PDNA) Training Manual

BRITISH ACCREDITATION COUNCIL INSPECTION REPORT. INTERIM INSPECTION (Short Course Provider)

What does this mean for the Effective Practitioner?

british council behaviours

DECISION MATRICES FOR OFFERING COURSES ONLINE

Role Profile. Directorate Corporate Support Department Customer Service and Business Transformation

River Clyde Homes: Officer Service Desk Analyst

GUIDANCE NOTE FOR DEPOSIT-TAKERS. Operational Risk Management. March 2012

ADRIAN DAVIS INFORMATION SECURITY FORUM

Theme 1 - What Knowledge and Skills for Humanitarian Workers?

Department of Health & Human Services

Security Unit Appeal MAA00026 Mid-Year Report

Leadership Development Efforts

Instruction note for ECHO staff on Remote Management

TERMS OF REFERENCE. Junior Professional Officer (JPO) Programme

Disaster Recovery Planning as a Means to Resilient Development. PDNA Course

E Distribution: GENERAL RESOURCE, FINANCIAL AND BUDGETARY MATTERS. Agenda item 6 FINAL UPDATE ON THE WINGS II PROJECT.

National Occupational Standards. Compliance

Achieving World-class Fabless Planning

APPROVED VERSION. Centro de Estudios Estratégicos de la Defensa Consejo de Defensa Suramericano Unión de Naciones Suramericanas.

Business Continuity Management Planning Methodology

Physical Security Services

Organizational agility the ability to react quickly to changing market circumstances is. Agility and Cost. Organizational Design and Key Workflows

Teaching and Learning Strategy for UCL Computer Science. Stage 1: the narrative or vision

Job Description. Industry business analyst. Salary Band: Purpose of Job

Logical Framework Planning Matrix: Turkish Red Crescent Organisational Development Programme

TLSA Consultancy Training elearning

BUSINESS CONTINUITY POLICY

State Board of Equalization 2015 SLAA REPORT

Child Protection in Crisis Uganda: March 2012 Learning Retreat

Fleet Selection Step Guide

Feedback and Complaints Mechanisms

IMO CONSIDERATION AND ADOPTION OF THE INTERNATIONAL SHIP AND PORT FACILITY SECURITY (ISPS) CODE

FINANCIAL MANAGEMENT MATURITY MODEL

What is Human Resource Management?

CRITICAL CHAIN AND CRITICAL PATH, CAN THEY COEXIST?

UNITED NATIONS OFFICE FOR PROJECT SERVICES. ORGANIZATIONAL DIRECTIVE No. 33. UNOPS Strategic Risk Management Planning Framework

Help Desk & Software Support - Bruin NY, NY

Ensuring WHO s capacity to prepare for and respond to future large-scale and sustained outbreaks and emergencies

Framework of competencies in spiritual care: A Modified Delphi study for nurses and midwives

Gender Action for Peace and Security Strategy

CRITICAL INCIDENT RESPONSE POLICY

P3M3 Portfolio Management Self-Assessment

Certification in Humanitarian Supply Chain Management (CHSCM) Competence Model. Final Version 2007

Humanitarian Accountability Partnership-International

Good Practice Guidelines for Appraisal

EMERGENCY MANAGEMENT PLANS AND DEFICIENT DAMS (INTERNATIONAL BEST PRACTICE OR A HOME- GROWN APPROACH?)

Operational Risk Management Policy

JOB DESCRIPTION Recruitment Manager (Consultancy)

Importance of MRM Training

Information Security Managing The Risk

INFORMATION MANAGEMENT STRATEGY MEETING 7 April UNAMA Conference Room Chaired by Nigel Fisher (UNAMA) and Ashraf Ghani (AACA)

Creating mutual trust

ASSOCIATION OF CARIBBEAN STATES (ACS) 19th MEETING OF THE SPECIAL COMMITTEE FOR DISASTER RISK REDUCTION. Bogotá, Colombia, August

Human Capital Management: Leveraging Your Human Assets

EQF2 - Water Safety for Managers. Level 6

pm4dev, 2007 management for development series Introduction to Project Management PROJECT MANAGEMENT FOR DEVELOPMENT ORGANIZATIONS

RISK MANAGEMENT STRATEGY

Transcription:

Cite as www.jha.ac/articles/a060.pdf BEYOND PLANNING: TOWARDS A MODEL OF MANAGEMENT COPING WITH THE CHALLENGES OF THE HUMANITARIAN WORK Luis Enrique Eguren July 2000 SUMMARY The challenges faced by humanitarian agencies working in violent scenarios pose the need for comprehensive and dynamic systems to cope with the requirements. Security planning cannot answer all the questions: we must take a step further and discuss a model for management. In this paper we propose an overall framework for a management process and an incremental approach to management. Both topics should allow agencies and practitioners to better undertake strategies for coping with the challenges of humanitarian work. MANAGEMENT VERSUS PLANNING Some of the most effective humanitarian agencies have a Security Plan carefully stored in the fifth drawer of the senior manager desk (of course in many agencies that fifth drawer is full with other documents, and there is no a drawer for plans). Even that Security Plan may consist of a series of protective measures, contingency plans and safety rules, which may be useful as guidelines but do not grasp the fact that that requires an adequate overall management, and it means much more than a plan. Security cuts through all aspects of an agency s work in a conflict scenario: it has to do with operations (as any targeting the agency may suffer can be consequence of its operations), with assessing a changing context (and conflict scenarios can change quickly), with flows of information (recording and assessing incidents), with personnel (from recruiting to training and team building), with budgeting and funding and so on (for an in depth analysis of management see Koenraad van Brabant s manual 1 and other relevant initiatives 2 ). The still pending question now is: how can we handle the necessary integration of in all the management levels of an agency s work? We have already mentioned the plans, which usually run separatedly from the work plans and often become a static document, disconnected from the operations or from the headquarters management activities and far from the dynamic approach requires. But having such plans may lead to a sense of good practice in which may prevent agencies from undertaking the necessary holistic approach to. In other words, what we are posing here is that such plans may actually be an obstacle in achieving a real level of while working in a violent enviroment: We 1 Operational Security Management in Violent Enviroments (2.000), Koenraad Van Brabant, Overseas Development Institute, London. 2 We can quote at least the leading work in training in management done by REDR (Registered Engineers for Disasters Relief, London) and the Interaction/OFDA initiative for developing a training curriculum in.

need to manage issues, instead of planning for them. Let s visualize in the following diagram how can we achieve it 3. MANAGING FOR : A DYNAMIC APPROACH. SCENARIO ANALYSIS AND STRATEGY PLANNING WORK EVALU ATION OPERATIONS: - Scenario analysis - Aims and objectives : - Scenario analysis -Space: consent / acceptance -Incidents assessment -Cross-cutting issues -Risk assessment and vulnerability. WORK PLAN (includes activities/reactions) GUIDELINES -S.O.P. -Protective measures -Contingency plans 0 loop GENERAL FOLLOW UP OF WORK INCIDENTS ASSESSMENT GEN ERAL SECU RITY VALUES, PRINCI- PLES, MANDATE (micro) scenario and vulnerability assessment Strategic loop Basic loop HEADQUARTERS MANAGEMENT TEAM: - Senior manager - Security manager FIELD MANAGEMENT TEAM: - Senior manager - Security field officer FIELD OFFICER We can read this diagram from left to right, following the standard management lines (from scenario analysis to work planning, execution and evaluation). From this diagram we can visualize how can be fully integrated into the management process of a project: Security occupies a specific niche when analyzing the scenario and setting the aims and objectives of the work, as well as when planning the work, following it up and evaluating its results. The guidelines occupy a specific place (in the planning stage) in the overall process, where they become alive working documents which receive feedback from the follow up and evaluation stages. 3 This diagram has benefitted from the invaluable input from Koenraad van Brabant, Jan Davis and the other attendants to a REDR workshop on reviewing REDR management course (May 2000).

We can also read the diagram looking at the three loops, which feed into the process from the records and assessment of the incidents. The 0 loop means that no action is taken after a incident: it may be because there is no need for a reaction or because no action is taken. The basic loop allows for the assessment to feed into either the guidelines (at least) or the work plan (preferably). The basic loop allows for producing certain actions and reactions which may create or develop the guidelines; this is the case, for example, when after a incident (let s say a bomb threat) the agency prepares a standard operation procedure for dealing with bomb threats and an evacuation plan. If the basic loop feeds into the work plan, it may allow the agency to consider changes or adaptations in its work plan, so that it can react to the bomb threat and perhaps stop the activity that prompted an armed actor to threaten the agency in the first place. The strategic loop takes the process a step further, allowing the incident assessment to feed into the scenario analyses and strategy stage; following the former example, if the agency has the mechanisms for the strategic loop to function (work teams and ad hoc agendas), it would allow the agency to consider the impact of its programme on the objectives and interests of the armed actors, and design an ad hoc strategy to either continue with its programme whilst protecting its space of work or to change its programme, taking into account other variables (like vulnerability) as well as its principles and mandate. As we can see, the basic loop is the minimum process for allowing an also basic process to work (provided that some basic documents and procedures -like contingency plans or protective measures- exist and are complied with). This basic loop is the one you can find functioning in most of the institutions in the field, often in an incomplete way (for example not having some contingency plans, or not having established mechanisms for the assessment to feed into the work plan). The basic loop is also important because at least it allows the agency to have an incremental process for developing procedures: no agency starts working in the field with an overall process, and the capacity to improve it gradually is fundamental for achieving a basic practice. The strategic loop (assuming that the basic loop is also working) is a powerful tool which provides the agency with the right approach to management, as it allows managers to make well informed decisions to prevent the main aspects of vulnerability when designing the programme (especially the impact of the programme in the conflict scenario). The lower layer of the diagram allows us to see who is in charge of what in management, from the field to the headquarters level. Sometimes there is a field officer in an agency, but less often you can find a field level management team (and rarely you can find such a team at the headquarters level). These teams play fundamental roles in allowing the feedback mechanisms to work.

The time sequence shown in the diagram may suggest that the management team can only analyze the scenario and make major decisions once or twice a year. For the sake of clarity, the diagram is designed showing one cycle of the process. But of course the cycle can be repeated (fully or partially) several times a year, provided it is necessary (for example in a high risk area): that is the function of the diversion of the strategic loop, named (micro)scenario and vulnerability assessment. Its position (in the middle between the programme level headquartersand field level work plan-) means that such assessment may require the participation of the field level management team, as the leading team for this purpose, together with the officer at headquarters COPING WITH CHALLENGES: MANAGEMENT AS AN INCREMENTAL PROCESS In terms of so much cannot be predicted that it is essential to be able to react rapidly when a incident occurs. Security management is never finished and is always partial and selective. It rarely can attempt a comprehensive, long-term view: Its contribution relies on its ability to prevent incidents and to point to the need for organizational integration and coordination to cope with such incidents. Maybe this is not very ambitious, but we also have to take into account that few resources are usually allocated for, so that we never can be comprehensive. Pragmatism is a must in management. As we mentioned before, when reviewing the practice of an agency you always find some kind of guidelines or plans or measures or patterns of behaviour in progress. There are many forces at stake, from stereotypes about practice to a reluctance to increase the existing workload by incorporating new activities. Security practice is typically fragmented, evolutionary and largely intuitive. In terms of management it is necessary to proceed step by step, making incremental changes to improve performance. Security strategies and procedures tend to emerge from strategic subsystems, each of which covers a specific area of work (logistics, a field team specially concerned with its, a headquarters manager under pressure by donor s concerns for, etc.). Incrementalism 4 in management opens the door to informal processes and allows space for nucleus of change agents at work. Precipitating events (such as incidents) prompt urgent, interim decisions that shape the practice and that, if properly managed, becomes part of a widely shared consensus for action among members of the field and management teams. How can all this be managed in order to achieve a good practice? There are limits that constrain the system 5 : cognitive limits (not all factors affecting can be aggregated and treated simultaneously in order to arrive at a holistic decision) and process limits (the timing and sequence imperatives necessary to create awareness, develop consensus, train people, ensure an adequate personnel turnover, implement activities, etc.). Therefore almost all of these subsystems and practices must be managed and linked together by a conscious incremental approach: can be dealt within 4 There are many studies about incrementalism and strategic planning. The approach reflected in this document draws on the work by C.E.Lindblom and James B. Quinn, among others. 5 Quinn, James B.: Strategic change: logical incrementalism. Sloan Management Review Summer 1989 (pp. 45-60)

the logic of each subsystem, so that a consistent pattern can be maintained among the decisions and activities implemented in that subsystem. In the overall system, broad goals and policies will be set, so that they can accomodate a variety of specific activities and proposals from below, handle urgent matters, respond to unforeseen events and react to incidents. Adequate management links together and brings order to a series of processes and decisions spanning years, learning from failures and building on good practices and succesful outcomes. As shown in the previous diagram, such management follows a dynamic process with neither a real beginning nor a real end, but one which develops into a highly efficient and cost-effective system. For a system of management to be incremental, it requires that the basic and strategic loop are in operation. The basic loop can be developed improving the existing practices and allowing and promoting the implementation of new ones, as well as making space for this loop to feed into the work plans (down-top approach). The strategic loop requires headquarters management decisions to be implemented (topdown approach), generally involving several management bodies (policy, programmes, funding, etc.). These relationships can be reflected in the following matrix, showing the incremental levels of implementation of management activities: Strategic loop Scenario and programme assessment periodical and adaptable Scenario and programme assessment in fixed terms Not in operation Not in operation Not in operation Working No as a regular point on the agenda Incidentally is a point on the agenda Security as a point on the agenda Security as a point on the agenda Basic loop Work plans reviewed according to Security guidelines and procedures Work plan reviews prompted occasionally by incidents Some guidelines in operation Periodical work plan reviews under the point of Many guidelines in operation. Security officer assigned. Periodical work plan reviews under the point of Most (reviewed) guidelines in operation. Security officer Compliance checked Periodical work plan reviews under the point of Most (reviewed) guidelines in operation. Security officer Compliance checked minimum low medium high Basic management Strategic management

CONCLUSION Security management confronts the risk of violent and rapidly changing scenarios and addresses the vulnerability of humanitarian agencies in the midst of such a risk: It therefore must be a dynamic and ever green system, a framework to guide and provide consistency for future decisions made incrementally. To act otherwise would be to deny that further information could have a value. Security management becomes the interface where strategies and work plans meet armed and violent challenges, the living interface which allows the agency to cope with unforeseen events and at the same time provide a sense of stability to humanitarian work. Luis Enrique Eguren, MD, works as Coordinator of the Colombia Project of Peace Brigades International. He is also an independent consultant and trainer in several areas, being among them and protection in humanitarian work. (Note: with thanks to Julia Metcalfe, who reviewed the translation and style of the first version in English)