MbrlCatalogueTitleDetail

Do you wish to reserve the book?
Identity management in disaster response environments: A child exploitation mitigation perspective
Identity management in disaster response environments: A child exploitation mitigation perspective
Hey, we have placed the reservation for you!
Hey, we have placed the reservation for you!
By the way, why not check out events that you can attend while you pick your title.
You are currently in the queue to collect this book. You will be notified once it is your turn to collect the book.
Oops! Something went wrong.
Oops! Something went wrong.
Looks like we were not able to place the reservation. Kindly try again later.
Are you sure you want to remove the book from the shelf?
Identity management in disaster response environments: A child exploitation mitigation perspective
Oops! Something went wrong.
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
Title added to your shelf!
Title added to your shelf!
View what I already have on My Shelf.
Oops! Something went wrong.
Oops! Something went wrong.
While trying to add the title to your shelf something went wrong :( Kindly try again later!
Do you wish to request the book?
Identity management in disaster response environments: A child exploitation mitigation perspective
Identity management in disaster response environments: A child exploitation mitigation perspective

Please be aware that the book you have requested cannot be checked out. If you would like to checkout this book, you can reserve another copy
How would you like to get it?
We have requested the book for you! Sorry the robot delivery is not available at the moment
We have requested the book for you!
We have requested the book for you!
Your request is successful and it will be processed during the Library working hours. Please check the status of your request in My Requests.
Oops! Something went wrong.
Oops! Something went wrong.
Looks like we were not able to place your request. Kindly try again later.
Identity management in disaster response environments: A child exploitation mitigation perspective
Identity management in disaster response environments: A child exploitation mitigation perspective
Journal Article

Identity management in disaster response environments: A child exploitation mitigation perspective

2018
Request Book From Autostore and Choose the Collection Method
Overview
The immediate disaster response environment exposes people to a multitude of risks, including identity risks. Those working in disaster response environments use identity management systems to protect people, especially vulnerable people and children. This paper examines identity management systems and the way they address risks of child trafficking and exploitation. This research offers a unique perspective into the experiences of non-state actors and the role they play in identity management systems during disaster response. A case study of Tropical Cyclone Winston is used to explore views of identity management and how they reduce risks to children. The case study showed that the role of the community in identity management, verification and associated controls were geographically concentrated and not readily portable. This created risks to children of trafficking and exploitation, particularly where evacuation centres and shelters were geographically removed from the children's communities. An Event Analysis of Systemic Teamwork method revealed that those working in the disaster response environment rely heavily on information from the community and government when identifying children. Where there are gaps in the information and social networks in the identity management process there are significant risks to children. These insights are relevant to disaster response planning.

MBRLCatalogueRelatedBooks