<?xml version="1.0"?>
<oembed><version>1.0</version><provider_name>InterAction</provider_name><provider_url>https://www.interaction.org</provider_url><author_name>Mitch McQuate</author_name><author_url>https://www.interaction.org/author/mmcquate/</author_url><title>Managing the Security of Aid Workers with Diverse Profiles - InterAction</title><type>rich</type><width>600</width><height>338</height><html>&lt;blockquote class="wp-embedded-content" data-secret="9sLGaD3MiE"&gt;&lt;a href="https://www.interaction.org/resource-library/managing-the-security-of-aid-workers-with-diverse-profiles/"&gt;Managing the Security of Aid Workers with Diverse Profiles&lt;/a&gt;&lt;/blockquote&gt;&lt;iframe sandbox="allow-scripts" security="restricted" src="https://www.interaction.org/resource-library/managing-the-security-of-aid-workers-with-diverse-profiles/embed/#?secret=9sLGaD3MiE" width="600" height="338" title="&#x201C;Managing the Security of Aid Workers with Diverse Profiles&#x201D; &#x2014; InterAction" data-secret="9sLGaD3MiE" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"&gt;&lt;/iframe&gt;&lt;script type="text/javascript"&gt;
/*! This file is auto-generated */
!function(c,d){"use strict";var e=!1,o=!1;if(d.querySelector)if(c.addEventListener)e=!0;if(c.wp=c.wp||{},c.wp.receiveEmbedMessage);else if(c.wp.receiveEmbedMessage=function(e){var t=e.data;if(!t);else if(!(t.secret||t.message||t.value));else if(/[^a-zA-Z0-9]/.test(t.secret));else{for(var r,s,a,i=d.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),n=d.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),o=new RegExp("^https?:$","i"),l=0;l&lt;n.length;l++)n[l].style.display="none";for(l=0;l&lt;i.length;l++)if(r=i[l],e.source!==r.contentWindow);else{if(r.removeAttribute("style"),"height"===t.message){if(1e3&lt;(s=parseInt(t.value,10)))s=1e3;else if(~~s&lt;200)s=200;r.height=s}if("link"===t.message)if(s=d.createElement("a"),a=d.createElement("a"),s.href=r.getAttribute("src"),a.href=t.value,!o.test(a.protocol));else if(a.host===s.host)if(d.activeElement===r)c.top.location.href=t.value}}},e)c.addEventListener("message",c.wp.receiveEmbedMessage,!1),d.addEventListener("DOMContentLoaded",t,!1),c.addEventListener("load",t,!1);function t(){if(o);else{o=!0;for(var e,t,r,s=-1!==navigator.appVersion.indexOf("MSIE 10"),a=!!navigator.userAgent.match(/Trident.*rv:11\./),i=d.querySelectorAll("iframe.wp-embedded-content"),n=0;n&lt;i.length;n++){if(!(r=(t=i[n]).getAttribute("data-secret")))r=Math.random().toString(36).substr(2,10),t.src+="#?secret="+r,t.setAttribute("data-secret",r);if(s||a)(e=t.cloneNode(!0)).removeAttribute("security"),t.parentNode.replaceChild(e,t);t.contentWindow.postMessage({message:"ready",secret:r},"*")}}}}(window,document);
&lt;/script&gt;
</html><description>This research paper from EISF is targeted at staff members within NGOs who have the responsibility for ensuring the security and wellbeing of staff members - for example, security focal points, HR specialists and senior managers. The research aims to better understand whether diversity is systematically addressed by aid organizations within their security risk management systems, and what challenges aid organizations face in relation to managing the security of aid workers while being mindful of their diversity. The research aims to identify good practice, and provide guidance to aid organizations on how to balance staff security and duty of care obligations while still respecting their employees rights to privacy, equality and inclusion.</description><thumbnail_url>https://www.interaction.org/wp-content/uploads/2019/02/IA-share-FB.png</thumbnail_url><thumbnail_width>1200</thumbnail_width><thumbnail_height>630</thumbnail_height></oembed>
