7. Take adequate security measures
Image: studio KO
A conflict sensitive approach is relevant for both the impact of research on the context as well as for the security of the persons involved in research. Particularly when research is securitized (by demand of stakeholders, following protocols that were intended for other contexts/other institutions), you need to assess how this affects implementation and your research results.
Questions
- What are adequate personal safety and data security measures (for researchers and participants, both local and international)?
- What security protocols exist? What social control that helps your safety exists?
- Are vulnerable populations or individuals involved? What are safeguards to avoid harm?
- Are security measures budgeted and feasible in the respective context (i.e. telephone and internet connections, access to security and digital infrastructure)?
- Which (local/international) institutes have capacity to deliver security support?
Recommendations
- Conduct a risk assessment with everyone concerned, including the questions above and points below.
- Maintain a large network to regularly access local and international sources of information on safety and security.
- Link and adhere to the security protocols of your partner organisation, particularly if your research institution is not familiar with the local situation or unable to support you in case of security accidents.
- Institutions may offer safety and security training for their researchers.
- Make a well-informed choice between a «securitized» (police escorts, armed protection, etc.) and a low profile (no protection, «local» appearance, etc.) approach. Both have advantages and disadvantages.
- Refrain from personal relationships with actors in conflict contexts.
- Organize conferences in secure places that both local and international researchers can access.
- Ensure sensitive data management and anonymization of sources. Prepare (with your research partners and funding institution) on how to react in case research data ends up in the wrong hands.
- Be aware that expensive research equipment could be a security liability in a context prone to theft.