Technologies of the Fourth Industrial Revolution (4IR) are being tested and adopted at a significant rate in humanitarian emergency response. However, the crossing of physical, biological, and cyber domains that characterises these technologies threatens the independence of humanitarian organisations. This is occurring in an environment in which the value and purpose of independence is already seriously questioned, both in practice, and in principle. This paper argues that the loss of independence stems from two related trends. First, several 4IR technologies are improving the capacity of humanitarian organisations to gather, synthesise, and analyse data, resulting in the production of information of increasingly strategic, political or mil...
Power outages, manipulations of data, and interruptions of Internet access are all possible effects ...
Abstract This article presents the results of an exploratory study into aid agencies’ use of technol...
Master's thesis in Risk management and societal safetyThe evolving possibilities of using new types ...
Technologies of the Fourth Industrial Revolution (4IR) are being tested and adopted at a significant...
Debates are ongoing on the limits of - and possibilities for - sovereignty in the digital era. While...
Cyber operations are designed to be a tool for defense, security and war. In the same way as harmles...
Technological advances are altering the contemporary asymmetric conflicts between non-‐state armed ...
Humanitarian action, the process of aiding individuals in situations of crises, poses unique informa...
New information and communication technologies (ICTs) are spreading rapidly around the world, especi...
Limits of social media monitoring in humanitarian crises This paper explores the use of social netwo...
Technology and the digital space are transforming the nature of power in humanitarian settings on an...
Abstract Digital communication technologies play an increasingly prominent role in humanitarian oper...
Military cyber capacity, built to be a part of military operations, can be utilized for humanitarian...
Military cyber capacity, built to be a part of military operations, can be utilized for humanitarian...
The humanitarian sector is entering in the network age. The explosion in access to new information a...
Power outages, manipulations of data, and interruptions of Internet access are all possible effects ...
Abstract This article presents the results of an exploratory study into aid agencies’ use of technol...
Master's thesis in Risk management and societal safetyThe evolving possibilities of using new types ...
Technologies of the Fourth Industrial Revolution (4IR) are being tested and adopted at a significant...
Debates are ongoing on the limits of - and possibilities for - sovereignty in the digital era. While...
Cyber operations are designed to be a tool for defense, security and war. In the same way as harmles...
Technological advances are altering the contemporary asymmetric conflicts between non-‐state armed ...
Humanitarian action, the process of aiding individuals in situations of crises, poses unique informa...
New information and communication technologies (ICTs) are spreading rapidly around the world, especi...
Limits of social media monitoring in humanitarian crises This paper explores the use of social netwo...
Technology and the digital space are transforming the nature of power in humanitarian settings on an...
Abstract Digital communication technologies play an increasingly prominent role in humanitarian oper...
Military cyber capacity, built to be a part of military operations, can be utilized for humanitarian...
Military cyber capacity, built to be a part of military operations, can be utilized for humanitarian...
The humanitarian sector is entering in the network age. The explosion in access to new information a...
Power outages, manipulations of data, and interruptions of Internet access are all possible effects ...
Abstract This article presents the results of an exploratory study into aid agencies’ use of technol...
Master's thesis in Risk management and societal safetyThe evolving possibilities of using new types ...