Authors
Viswanathan, Shruti, Namirembe, Eunice, Politi, Chryssa, Nayak, Jyoti, Paillé, Pauline, Toole, Hampton, Ohrvik-Stott, Jacob, Besse, James
- Division
- RAND Europe
- Pages
- 30
- Published in
- United States
- RAND Identifier
- RR-A3192-3
- RAND Type
- report
- Rights
- RAND Corporation
- Series
- Research Reports
- Source
- https://www.rand.org/pubs/research_reports/RRA3192-3.html
Table of Contents
- Summary 3
- Step 0. Technology need identifi cation pre-requisite 4
- Step 1. Technology selection Step 2. Scoping technology application 4
- Step 4. Technology and guidance deployment 4
- Cross-cutting considerations for humanitarians across all steps 4
- Step 3. Guidance development if yes to Step 2 decision questions 4
- Preface 5
- Table of contents 6
- Tables 6
- Figures 6
- Boxes 7
- Abbreviations 7
- Chapter 1. 8
- 1.1. Study scope and context 8
- 1.2. Guidance presentation and objective 9
- 2.1. Overview of proposed step- by-step guidance 10
- Chapter 2. 10
- Step 0. Technology need identifi cation pre-requisite 11
- Step 1. Technology selection Step 2. Scoping technology application 11
- Step 4. Technology and guidance deployment 11
- Cross-cutting considerations for humanitarians across all steps 11
- Step 3. Guidance development if yes to Step 2 decision questions 11
- 2.2.1. Preparation stage 12
- 2.2. Step 1. Preparation activities and technology selection 12
- Preparation Phases 1A and 1B Gap identification and consolidating findings 15
- Preparation Phase 2 Technology issue exploration 15
- 2.2.2. Technology selection 17
- 2.3. Step 2. Defining requirements for technology application 19
- 2.4. Step 3. Deploying technology and developing guidance 21
- 2.5. Step 4. Monitoring and assessing technology and guidance deployment 23
- 2.6. Cross-cutting themes and considerations 24
- 2.6.1. Humanitarian principles and ethics 25
- 2.6.2. Understanding and inclusion of crises-affected communities 25
- 2.6.3. Stakeholder engagement 27
- 4.6.4. Communications and coordination 28
- 2.6.5. Constraints and barriers 29
- Data protection and cyber security 29
- Technology scepticism 30