Human Security. 1 December Human Security Unit United Nations New York

Similar documents
Briefing on the Report of the Secretary-General on Human Security (A/66/763)

Proforma Cost Overview for national UN Volunteers for UN Peace Operations (DPA/DPKO)

Mechanism for the Review of Implementation of the United Nations Convention against Corruption: country pairings for the second review cycle

Per Capita Income Guidelines for Operational Purposes

Country pairings for the second cycle of the Mechanism for the Review of Implementation of the United Nations Convention against Corruption

Bank Guidance. Thresholds for procurement. approaches and methods by country. Bank Access to Information Policy Designation Public

CUSTOMS AND EXCISE ACT, AMENDMENT OF SCHEDULE NO. 2 (NO. 2/3/5)

Mechanism for the Review of Implementation of the United Nations Convention against Corruption: country pairings for the second review cycle

Contracting Parties to the Ramsar Convention

Proforma Cost for national UN Volunteers for UN Partner Agencies

Country pairings for the first cycle of the Mechanism for the Review of Implementation of the United Nations Convention against Corruption

Proforma Cost for National UN Volunteers for UN Partner Agencies for National UN. months) Afghanistan 14,030 12,443 4,836

Geoterm and Symbol Definition Sentence. consumption. developed country. developing country. gross domestic product (GDP) per capita

Regional Scores. African countries Press Freedom Ratings 2001

Country pairings for the second review cycle of the Mechanism for the Review of Implementation of the United Nations Convention against Corruption

Country pairings for the first review cycle of the Mechanism for the Review of Implementation of the United Nations Convention against Corruption

Voluntary Scale of Contributions

TD/B/Inf.222. United Nations Conference on Trade and Development. Membership of UNCTAD and membership of the Trade and Development Board

Status of National Reports received for the United Nations Conference on Housing and Sustainable Urban Development (Habitat III)

A) List of third countries whose nationals must be in possession of visas when crossing the external borders. 1. States

2017 BWC Implementation Support Unit staff costs

A Practical Guide To Patent Cooperation Treaty (PCT)

TISAX Activation List

A) List of third countries whose nationals must be in possession of visas when crossing the external borders. 1. States

Overview of the status of UNCITRAL Conventions and Model Laws x = ratification, accession or enactment s = signature only

REGIONAL INTEGRATION IN THE AMERICAS: THE IMPACT OF THE GLOBAL ECONOMIC CRISIS

Country pairings for the first review cycle of the Mechanism for the Review of Implementation of the United Nations Convention against Corruption

CAC/COSP/IRG/2018/CRP.9

GLOBAL PRESS FREEDOM RANKINGS

Embassies and Travel Documents Overview

FREEDOM OF THE PRESS 2008

STATUS OF THE CONVENTION ON THE PROHIBITION OF THE DEVELOPMENT, PRODUCTION, STOCKPILING AND USE OF CHEMICAL WEAPONS AND ON THEIR DESTRUCTION

OFFICIAL NAMES OF THE UNITED NATIONS MEMBERSHIP

A Partial Solution. To the Fundamental Problem of Causal Inference

CENTRAL AMERICA AND THE CARIBBEAN

2018 Social Progress Index

Collective Intelligence Daudi Were, Project

AMNESTY INTERNATIONAL REPORT 1997

World Refugee Survey, 2001

LIST OF CONTRACTING STATES AND OTHER SIGNATORIES OF THE CONVENTION (as of January 11, 2018)

corruption perceptions index

Table of country-specific HIV/AIDS estimates and data, end 2001

Thirty-seventh Session. Rome, 25 June - 2 July Third Report of the Credentials Committee

corruption perceptions index

INCOME AND EXIT TO ARGENTINA

The requirements for the different countries may be found on the Bahamas official web page at:

58 Kuwait 83. Macao (SAR China) Maldives. 59 Nauru Jamaica Botswana Bolivia 77. Qatar. 63 Bahrain 75. Namibia.

Election of Council Members

Diplomatic Conference to Conclude a Treaty to Facilitate Access to Published Works by Visually Impaired Persons and Persons with Print Disabilities

Good Sources of International News on the Internet are: ABC News-

CORRUPTION PERCEPTIONS INDEX 2013.

CORRUPTION PERCEPTIONS INDEX 2013.

STATISTICAL UNV STATISTICAL AND FINANCIAL INFORMATION 2016

( ) Page: 1/12 STATUS OF NOTIFICATIONS OF NATIONAL LEGISLATION ON CUSTOMS VALUATION AND RESPONSES TO THE CHECKLIST OF ISSUES

Information note by the Secretariat [V O T E D] Additional co-sponsors of draft resolutions/decisions

=======================================================================

CORRUPTION PERCEPTIONS INDEX 2012.

The Geneva Declaration on Armed Violence and Development

Global Environment Facility

List of countries whose nationals are authorized to enter the Dominican Republic

NOTE BY THE TECHNICAL SECRETARIAT STATUS OF PARTICIPATION IN THE CHEMICAL WEAPONS CONVENTION AS AT 17 OCTOBER 2015

Programme budget for the biennium

NOTE BY THE TECHNICAL SECRETARIAT STATUS OF PARTICIPATION IN THE CHEMICAL WEAPONS CONVENTION AS AT 16 JUNE 2018

Millennium Profiles Demographic & Social Energy Environment Industry National Accounts Trade. Social indicators. Introduction Statistics

Candidates to lower or single house of parliament, a Share of women in the parliament, 2009 (%) of parliament 2008 Country or area

Governing Body Geneva, November 2006 LILS FOR INFORMATION. Ratification and promotion of fundamental ILO Conventions

Bahrain, Ecuador, Indonesia, Japan, Peru, Philippines, Republic of Korea, Serbia and Thailand.

STANDING COMMITTEE ON PROGRAMMES AND FINANCE. Twenty-first Session

NOTE BY THE TECHNICAL SECRETARIAT STATUS OF PARTICIPATION IN THE CHEMICAL WEAPONS CONVENTION AS AT 14 MARCH SUMMARY

Scale of assessments for the financial period

Hundred and Thirty-eighth Session. Rome, March Scale of Contributions

Countries 1 with risk of yellow fever transmission 2 and countries requiring yellow fever vaccination

Proforma Cost for international UN Volunteers for UN Partner Agencies for International UN Volunteers. Afghanistan 66,899 54,087 23,907

NOTE BY THE TECHNICAL SECRETARIAT STATUS OF PARTICIPATION IN THE CHEMICAL WEAPONS CONVENTION AS AT 25 MAY SUMMARY

Transparency International Corruption Perceptions Index 2014

Life in the UK Test Pass Rates

Report on Countries That Are Candidates for Millennium Challenge Account Eligibility in Fiscal

ALLEGATO IV-RATES APPLICABLE FOR UNIT CONTRIBUTIONS

ANNEXES. to the. Proposal for a REGULATION OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL

ANNEX IV: RATES APPLICABLE FOR UNIT CONTRIBUTIONS

ANNEX IV: RATES APPLICABLE FOR UNIT

TABLE OF COUNTRIES WHOSE CITIZENS, HOLDERS OF ORDINARY PASSPORTS, REQUIRE/DO NOT REQUIRE VISAS TO ENTER BULGARIA

From Whom to Whom? Official Development Assistance for Health Second Edition

APPENDIX 2. to the. Customs Manual on Preferential Origin

Transparency International Corruption Perceptions Index 2013

The Henley & Partners - Kochenov GENERAL RANKING

AUSTRALIA S REFUGEE RESPONSE NOT THE MOST GENEROUS BUT IN TOP 25

COMMISSION ON PHYTOSANITARY MEASURES

Geographical grouping 1

corruption perceptions index 2016

-Ms. Wilkins. AP Human Geography Summer Assignment

Figure 1: Global participation in reporting military expenditures ( )

Which Countries are Most Likely to Qualify for the MCA? An Update using MCC Data. Steve Radelet 1 Center for Global Development April 22, 2004

GLOBAL RISKS OF CONCERN TO BUSINESS WEF EXECUTIVE OPINION SURVEY RESULTS SEPTEMBER 2017

GUIDELINE OF COMMITTEES IN TASHKENT MODEL UNITED NATIONS CONFERENCE 2019

Admission of NGOs to official partnership with UNESCO or of Foundations and other similar institutions to official relations with UNESCO

Japanese-Language Programs for Foreign-Service Officers and Public Officials 2016/2017 Guidelines

APPENDIX A COUNTRIES GROUPED UNDER THE 2010 WORLD BANK DEVELOPING REGIONS AND COUNTRY INCOME GROUPINGS

Open Doors Foreign Scholars

Development Cooperation

Transcription:

Human Security 1 December 2011 Human Security Unit United Nations New York

Key driving forces in the emergence of human security The evolving security threats - - natural and man-made disasters; conflicts and internal violence; massive displacements; health related risks; sudden economic and financial downturns; human trafficking; etc. - - have resulted in revisiting old concepts and recognizing human insecurities as a major challenge to peace, security and long-term development. Conventional frameworks do not account for diversity of today s threats: Threats that move beyond traditional notions of security - - where both States and people are seriously challenged. Moreover, these evolving threats, not only challenge the individuals/local communities but all too often spill-over into national, regional and international security threats.

(con t) With human insecurity as a major challenge to peace and long-term development, and with the majority of the world s population continuing to live in extreme and vulnerable circumstances, in 2005, the UN World Summit Outcome document (A/RES/60/1), para 143, recognized that all individuals, in particular vulnerable people, are entitled to freedom from fear and freedom from want, with an equal opportunity to enjoy all their rights and fully develop their human potential This agreement was pivotal in galvanizing interest (particularly at the UN) in the notion of human security and its application. It also led to a clear distinction between the R2P and the human security agendas at the UN.

What is human security? It is a people-centered concept and as such it looks at the most critical and pervasive threats below which the survival, livelihood and dignity of individuals are seriously threatened. Furthermore, it highlights a set of elementary freedoms that are at the vital core of life - - freedom from fear, freedom from want, and freedom to live in dignity. Freedom from fear Threats to the safety of people (i.e., all forms of violence) Freedom from want Threats to basic needs (i.e., economic, social and environmental aspects of life) Freedom to live in dignity Threats to fundamental human rights

Human security emphasizes the triangular relationship between security, development and human rights and considers these to be the building blocks of human and therefore national security. Freedom from fear Conflicts, small arms, crime SECURITY Freedom from want Poverty, infectious disease, environmental degradation DEVELOPMENT Freedom to live in dignity Intimidation, identity-based discrimination HUMAN RIGHTS

Furthermore, as a mutually reinforcing concept, human security complements and builds upon each of these concepts. Subsequently, human security considers threats that not only result from external aggressions but also insecurities that are due to sudden downturns as well as persistent structural problems. Security (HS adds focus on people) Development (HS focuses on insuring gains not lost against sudden risks) Human Security Adds to each component and links all three Human Rights (HS refocuses on threats to freedoms)

The application of human security The application of human security rests upon five principles, as well as the protection and empowerment framework. The five human security principles are: People-centered (addresses the most critical and pervasive threat to a particular community and engages them in the process of strengthening their capacities to address the threat) Comprehensive (considers the broad set of conditions and actors that give rise to the threat and its impact on the different HS domains economic, food, health, environmental, personal, community, political, etc.) Multi-sectoral (identifies +ve inter-linkages between HS domains and develops multi-sectoral solutions based on multi-actor partnerships) Context-specific (takes into account the local, national, regional and global dimensions of the threat and solutions) Prevention-focused (addresses root causes and promotes structural <at all levels> and behavioral changes that can help prevent the crises from arising in the future)

These principles are subsequently applied in the protection and empowerment framework that further guarantees the development of appropriate responses/policies in view of a particular threat. The protection and empowerment framework Protection (top-down) (con t) Refers to norms, processes and institutions required to protect people from critical and pervasive threats. Recognizes that people face threats that are beyond their control. Requires protecting people in a systematic, comprehensive and preventative way, including the establishment of the rule of law, good governance, accountability and social protection instruments. The necessary protective measures should be considered at all levels (individual, local, national, regional, global).

Empowerment (bottom-up) (con t) Strategies that enable people to develop their resilience to difficult situations. Aims at developing the capabilities of individuals and communities to make informed choices and to participate in solutions that not only ensure human security for themselves but also for others. Based on the HS 5 principles and the protection and empowerment framework, different tools are utilized in order to focus attention on current and emerging threats; identify root causes; support early warning systems; and help mitigate the impact of these threats. Moreover, the application of human security promotes multistakeholder responses that are targeted, realistic and efficient as well as, strengthens local ownership, state-society relations and the resilience of societies to current and future threats.

Overall steps for human security programming PHASE 1: Situational analysis PHASE 2: Mapping and analysis of needs, vulnerabilities & capacities PHASE 3: Build strategies PHASE 4: Implement in a participatory manner PHASE 5: Human Security Impact Assessment

Phase 1: Situational analysis Outlines the root causes and the level of threat: whether global, regional, national, local (communities and individuals) Identifies the manifestations of a particular threat on different HS domains and its impact on people/communities as well as on the State and institutions. What does this phase achieve? Highlights the root causes and the level of threat. Contextualizes the needs and vulnerabilities of the impacted people/communities. Describes the existing protection and empowerment infrastructure.

Overall steps for human security programming PHASE 1: Situational analysis PHASE 2: Mapping and analysis of needs, vulnerabilities & capacities PHASE 3: Build strategies PHASE 4: Implement in a participatory manner PHASE 5: Human Security Impact Assessment

Phase 2: Mapping and analysis Helps identify the needs, vulnerabilities and capacities (plus resources) per HS domain; the possible +ve inter-linkages between these different domains; and the gaps in the existing protection and empowerment infrastructure. In consultation with impacted population and national counterparts, develops priorities based on the actual vulnerabilities and capacities. What does this phase achieve? Highlights the most serious insecurities (HS domains/sectors) that should be tackled. (Ensures goals are people-centered and response to their specific needs and vulnerabilities.) Provides an inventory of local capacities, resources and assets that should be built upon. Identifies gaps in the existing protection/empowerment infrastructure. Highlights the range of actors and sectors that should be mobilized in an integrated manner.

Overall steps for human security programming PHASE 1: Situational analysis PHASE 2: Mapping and analysis of needs, vulnerabilities & capacities PHASE 3: Build strategies PHASE 4: Implement in a participatory manner PHASE 5: Human Security Impact Assessment

Phase 3: Building strategies Builds strategies/responses that incorporate the 5 HS principles as well as the protection and empowerment framework. Outlines short, medium and long-term strategies/outcomes even if they will not be implemented in a particular programme. Assesses the potential +ve and -ve externalities of strategies. What does this phase achieve? Takes advantage of available expertise, shares knowledge, pools resources, and improves the efficiency and effectiveness of responses. Builds coherence and ensures complementarities among strategies. Identifies measures that address current/future gaps in the protection infrastructure and builds upon existing capacities to ensure local ownership, sustainability and resilience. It does this in a mutually reinforcing way that strengthens state-society relations and cultivates a culture of public discourse, prevention, early warning, and collective action.

Overall steps for human security programming PHASE 1: Situational analysis PHASE 2: Mapping and analysis of needs, vulnerabilities & capacities PHASE 3: Build strategies PHASE 4: Implement in a participatory manner PHASE 5: Human Security Impact Assessment

Phase 4: Implementation What does this phase achieve? By meaningfully engaging local actors, the implementation phase builds upon existing local capacities and resources in a sustainable manner. Provides space for local leadership to emerge and taps into untapped local potential that can further ensure national ownership and resilience.

Overall steps for human security programming PHASE 1: Situational analysis PHASE 2: Mapping and analysis of needs, vulnerabilities & capacities PHASE 3: Build strategies PHASE 4: Implement in a participatory manner PHASE 5: Human Security Impact Assessment

Phase 5: Human Security Impact Assessment While this is a component of the evaluation process, it can also be used before, during and after a given programme. BEFORE: To assess the ve and +ve externalities of proposed strategies and to enhance their multiplier potential. DURING: To garner lessons learned from failures and successes and to allow for adaptability/flexibility of strategies when necessary. AFTER: To evaluate against impact and sustainability (i.e., relevance, effectiveness and efficiency). What does this phase achieve? It goes beyond assessing interventions against typical input-output programme management indicators (e.g., whether delivery was done, on time, budget spent, etc.) Instead, it focuses attention on the human security of those directly effected.

The added value of the human security concept It is a practical and comprehensive approach to addressing the multi-dimensional threats facing people today. It focuses attention on the root causes and impacts of threats on people and, as a result, it promotes responses that are targeted and contextually relevant. It links top-down with bottom-up responses that ensure local ownership, resilience and sustainability. It brings together the relevant actors in an integrated manner and therefore it promotes coordinated responses and information sharing mechanisms that help identify the most effective and efficient responses to both current and future threats.

Overview of the UNTFHS From 1999 to 2006, the UNTFHS was funded solely by the Government of Japan. Since 2007, the Governments of Greece, Mexico, Slovenia and Thailand have also contributed to the Fund. The main objective of the UNTFHS is to support projects carried out by UN organizations and when appropriate, in partnership with non-un entities, to advance the operational impact and the added value of the human security concept. Projects are distributed globally with priority given to countries and regions where insecurities of people are most critical and pervasive.

As of 30 November 2011, 202 projects in over 70 countries have been approved by the UNTFHS. Haiti Cuba Honduras Guatemala El Salvador Colombia Ecuador Peru Bolivia Disclaimer: The designations employed and the presentation of material on this map do not imply the expression of any opinion whatsoever on the part of the Secretariat of the United Nations concerning the legal status of any country, territory, city or area or of its authorities, or concerning the delimitatio n of its frontiers or boundaries. Dotted line represents approximately the Line of Control in Jammu & Kashmir agreed upon by India and Pakistan. The final status of Jammu & Kashmir has not yet been agreed upon by the parties. Final boundary between the Republic of Sudan and the Republic of South Sudan has not yet been determined. Russian Turkmenistan Federation Kazakhstan Ukraine Uzbekistan Grenada Moldova Kyrgyzstan Barbados Belarus Tajikistan Bosnia and Pakistan Trinidad Herzegovina and Tobago Mongolia Kosovo Armenia Suriname Albania China Lebanon Afghanistan Burkina Faso India Senegal Viet Nam Eritrea Bangladesh Gambia Sudan Mali Guinea Ethiopia Liberia Uganda Sierra Leone Somalia Sri Lanka Ghana Kenya Rwanda Indonesia Nigeria Brazil Burundi Timor-Leste Gabon Tanzania Madagascar Congo Angola Malawi Democratic Republic of the Congo Zambia Botswana Zimbabwe Swaziland South Africa Lesotho Nepal Bhutan Japan Myanmar Lao People's Democratic Republic Philippines Cambodia Thailand Papua New Guinea Solomon Islands Vanuatu Fiji

Key funding criteria for the UNTFHS Providing concrete and sustainable benefits to people and communities threatened in their survival, livelihood and dignity. Taking into account the people-centered, comprehensive, multi-sectoral, context-specific and prevention-oriented aspects of the human security concept. Implementing the Protection and Empowerment framework by comprehensively including both top-down protection and bottom-up empowerment measures. Promoting partnerships with local entities (government and non-governmental) and encouraging implementation by these entities who will have the most direct impact on improving the overall human security situation, and can also ensure ownership and sustainability. Concentrating on those areas of human insecurity that are currently neglected and avoiding duplication with existing programmes and activities.

Having a pilot and innovative nature which could be replicated in other regions or countries through other sources of funding. Promoting inter-agency planning and implementation based on the comparative advantage of the applying organizations so as to advance the operational impact of the project. Examples of thematic areas supported to date: (con t) - - Lack of protection and empowerment mechanisms for those who are exposed to physical violence, discrimination and exclusion as a result of inequities in treatment, human trafficking, etc. - - Natural hazards and their related consequences on access to basic social services, economic security and communal vulnerability. - - Post-conflict reconciliation, reintegration and recovery with the aim to prevent the recurrence of conflicts. - - Urban violence and its impact on health, education, economic, personal and community security.

Lessons learnt from UNTFHS funded projects Clear recognition that threats to human security are multi-dimensional and therefore require multi-sectoral/mutli-actor design & implementation. While challenges remain on the ground for multi-agency/ integrated projects, nevertheless, human security is a practical and policy-oriented approach that helps define actions and priorities based on local realities and capacities. General consensus that the human security approach provides important opportunities for: strengthening relations among relevant stakeholders (including UN organizations, the public sector, and local communities) promotes an improved understanding of the insecurities (as well as expectations); results in more targeted, efficient and effective responses; and allows for a stronger culture of prevention (and also responsibility by all).

For more information on human security, please visit http://ochaonline.un.org/humansecurity Human Security Unit United Nations New York, NY 10017 E-mail: humansecurity@un.org