Search results

’Neill, 2010 ). And building such relationships requires not only time but human resources with interpersonal, communication and negotiation skills. Although those annual security trainings were an opportunity to remind colleagues that implementing an acceptance strategy required budgeting and planning, only once in five years was I able to train operations managers in headquarters on negotiating access. ‘Security is everyone’s responsibility’ was another mantra at departure-preparation awareness-raising sessions. If everyone was responsible for their own behaviour and for

Journal of Humanitarian Affairs
A Focus on Community Engagement

picture of engagement in practice, revealing murky social dynamics in some encounters, including aggressive appeals for collaboration, top-down decision-making and a lack of accountability ( Calain and Poncin, 2015 ; Carrión et al., 2016 ; Cohn and Kutalek 2016 ; Gomez-Temesio and Le Marcis, 2017 ; Oosterhoff and Wilkinson, 2015 ; Tengbeh et al. , 2018 ; Wilkinson and Fairhead, 2017 ; Wilkinson et al. , 2017 ). Building on this work, our ethnographic case studies aim to understand the sources and contingent nature of the legitimacy of a large

Journal of Humanitarian Affairs
Open Access (free)
Interpreting Violence on Healthcare in the Early Stage of the South Sudanese Civil War

member suggested that this expectation was shared by the local population, recalling: ‘When I was in the bush, people from the community even asked me “but you work for MSF, why are you with us?” … I thought MSF was supposed to look after us. But, they left us.’ Others had a more nuanced view, acknowledging that, unlike organisations with only a few local employees, MSF could not be expected to evacuate its 240 staff and their families. Still, the remarks pointed to differing views on the responsibility and capacity of an international NGO to protect its staff and

Journal of Humanitarian Affairs
Open Access (free)
Governing Precarity through Adaptive Design

diagnosis, building in constant prototyping, tolerating failure and changing institutional incentives to counter professional mental models and rule-based thinking ( ibid .: 192–3). The aim of adaptive design is to correct the cognitive biases of aid managers while, through increasing bandwidth, encouraging the agency, auto-projectising and self-acting capacities of the precariat. Important here is strengthening the empathy of managers while improving the users’ experience of the system. The Humanitarian Policy Group’s ( HPG, 2018 ), A

Journal of Humanitarian Affairs
From the Global to the Local

-approved ‘reforms’. 3 This ‘catastrophic’ decision ( AFP, 2018 ) was widely denounced around the world as a form of collective punishment against the Palestinian people ( Bachner, 2018 ; Dumper, 2018 ). By the end of August 2018, when the US Government announced its decision to completely defund UNRWA, commentators identified this as part of a strategy to force Palestinian refugees to rescind the Right of Return to Palestine (a right set out in UNGA Resolution 194). 4 Many noted that undermining the Agency’s capacity to deliver relief and services

Journal of Humanitarian Affairs
Towards Specialised Services?

legal and technical analysts to be special, due to its decentred construction, which separated it from earlier ‘technologies of freedom’ including radio and the telegraph. It is important to recognise the E2E principle governing Internet architecture. The Internet had never been subject to regulation beyond that needed for interoperability and competition, building on the Computer I and II inquiries by

in Network neutrality

at stake, this has to have absolute priority with regards to quality and capacity. 14 He appeared to believe that drone vehicles needed a continuous low-latency, high-speed connection via the public Internet. (It is impossible to overstate how important the automobile industry is to southern German politicians, especially his

in Network neutrality
Open Access (free)

which a researcher works can put collegial pressure on the researcher to curb investigation into malfeasance. 17 Research into detection of violation in Europe has been deliberately blocked by potential funders, whether or not under pressure from corporate interests, while research building the technical and economic case for violation has been richly rewarded. Those academics conducting research that measures net

in Network neutrality
Open Access (free)
Neutrality, discrimination and common carriage

regulation beyond that needed for interoperability and competition, building on the Computer I and II inquiries by the FCC in the United States, and the design principle of End to End (E2E). That principle itself was bypassed by the need for greater trust and reliability in the emerging broadband network by the late 1990s, particularly as spam email led to viruses, botnets and other risks. The E2E principle governing Internet

in Network neutrality
Privacy, liability and interception

equivalent of the postal address for the packet. An IAP can use DPI to determine whether a data packet values high-speed transport – as a television stream does in requiring a dedicated broadcast channel – and therefore offer higher-speed dedicated capacity to that content, typically real-time dependent content such as television, movies or telephone calls using VoIP. Most voice calls and video use a

in Network neutrality