Presentation is loading. Please wait.

Presentation is loading. Please wait.

Protection analysis tools

Similar presentations


Presentation on theme: "Protection analysis tools"— Presentation transcript:

1 Protection analysis tools

2 Core problem analysis Core problem
The initial assessment of the protection situation will normally show that several root causes can exist for each of the contributing factors to a protection problem. If we manage to address these causes, we will be able to break the causal chain, thereby solving the problem. We can visualize this kind of analysis in the form of an inverted tree, with the problem/protection risk at the top and all the possible causes spreading like roots from the trunk of the tree. If we plan specific actions to address the different causes, at all possible levels, meaning also the “causes of the causes” or underlying causes, this will already provide the content of key outputs that need to be part of our strategy in order to reach our objective and achieve the required results. The inability to enjoy a specific right often affects the ability to exercise other rights. We must analyse this kind of consequences arising from existing protection risks. This will necessarily lead to the planning of additional objectives, with corresponding outputs and activities. This is particularly important, for instance, in cases of SGBV, where it is equally vital to address both the causes as well as the consequences of the violence, exploitation or abuse. An advantage of the Core Problem Analysis is that it is easily translated into a strategy. For example, Problem: SGBV Objective: Prevention and Response to SGBV Identified Cause: lack of fuel for cooking Activities: provide alternate sources of fuel, fuel efficient stoves, etc. Consequence: unwanted pregnancy Indicator: % reduction in unwanted pregnancy It should be noted that the Results Framework embodied in Focus includes pre-identified problems, and a set of pre-identified causes and related objectives and outputs for each problem. This ensures a consistent approach to defining objective and outputs and enables comparisons between operations. However, the Results Framework cannot show all the possible inter-relations between problems and causes, objectives and outputs. In addition, problems, causes, objectives and outputs in the Results Framework are necessarily defined in broad terms that may not sufficiently reflect the specific concerns of a particular age, gender or other sub-group.

3 Environment-Building
The Egg Model Environment-Building Remedial Responsive Violation Abuse This model of protection analysis is among the most widely recognized and used models within humanitarian organizations. It is called the egg model and has emerged during inter-agency discussions on the protection afforded by the ICRC. This model uses the shape of an egg to think strategically about different areas / types of action in which the protection needs to be addressed and the different types of activities needed to meet the protection needs. These different types of action can be carried out simultaneously. 3 types of protection activity: Responsive: Prevent and stop violations or abuses ; alleviate immediate effects; focus on individuals or groups Remedial: Restore dignity; support affected people; prevent secondary abuses or risks Environment-Building: Contribute to environment that encourages authorities to respect their obligations and rights of individuals; change in attitudes, policies, values, beliefs; address underlying causes Responsive: The sphere of action that is the most immediate to victims/survivors. This sphere requires a series of actions in response aimed to stop, prevent or alleviate the worst effects of such abuse. Example: Violation: in the case of rape of a woman at night near the latrine. Respond: ensuring medical treatment of the victim and her immediate safety. Immediate impact. Remedial: the second sphere is more restorative. It relates to the assistance and support of the victims of violations and who live with their consequences. This sphere of action involves a series of remedial actions to help people to recover. In this case: Ensure the reintegration of the survivor in his community, psycho social and law enforcement in this case. Building the environment: Impact preventive long-term: The third sphere of action is further point in relation to the act violation and is concerned to place the entire company under protection standards that prevent or limit the current and future violations and abuses. This is the sphere of action the more structural and longer term. It requires efforts to strengthen environmental standards that consolidates political, social, cultural and institutional environment protection. Strengthen the environment: prevention activity such as awareness campaigns, training of police and judicial personnel, health personnel if necessary, improved site development by bringing latrine shelters, lighting the latrines at night, creating community safety brigades night etc .... 3

4 A Humanitarian Orchestra?
The egg model allows distinguishing between different types of action, and helps consider who is the best placed actor to pursue what kind of action. It enables humanitarian organizations and authorities to reflect together on how they can be complementary. If the egg model provides a useful framework for planning activities for a single organization, it also presents its three spheres of action a very useful approach for protection work collectively, systemically distinguishing activities for response, remedial and strengthening activities of the environment but also considering which protection actor is best placed to continue this type of action in a given situation. In other words, it allows humanitarian organizations to reflect on how they can be complementary in their efforts to work with each other but also with the authorities, endangered populations and civil society in order to ensure protection. The key concept of complementarity emphasizes the importance of diversity and cooperation in the protection system


Download ppt "Protection analysis tools"

Similar presentations


Ads by Google