Skip to content
Contact Us | Tel. +49 511 762 – 17715 | @: niederee[at]L3S.de
h2020mirror
  • Home
  • About
    • Collaborations and Synergies​
  • Work Plan
  • News
  • Consortium
  • Downloads
  • Publications
  • Contact
  • Toolkit
Menu Close
Toggle the button to expand or collapse the Menu
  • Home
  • About
    • Collaborations and Synergies​
  • Work Plan
  • News
  • Consortium
  • Downloads
  • Publications
  • Contact
  • Toolkit

Risk Assessment

  1. Home>
  2. Toolkit>
  3. Risk Assessment

Human Security Filter – Open-Source Information

  • Post published:September 16, 2024
  • Post category:Risk Assessment/Toolkit

The data sources for the Human Security Filter (HSF) are a mix…

Continue ReadingHuman Security Filter – Open-Source Information
Human Security Filter – Open-Source Information

Human Security Filter – Correlations

  • Post published:September 16, 2024
  • Post category:Risk Assessment/Toolkit

Correlations Indicators Human Security Filter Indicators can be positively correlated (e.g. age…

Continue ReadingHuman Security Filter – Correlations
Human Security Filter – Correlations

Human Security Filter – Composite Indicator

  • Post published:September 16, 2024
  • Post category:Risk Assessment/Toolkit

The Human Security Filter (HSF) aims to measure a complex, multidimensional phenomenon,…

Continue ReadingHuman Security Filter – Composite Indicator
Human Security Filter – Composite Indicator

Guidelines for assessing risk integration in the field of migration

  • Post published:September 10, 2024
  • Post category:Risk Assessment/Toolkit

One defining element of border security risks is their interconnectedness.There is no…

Continue ReadingGuidelines for assessing risk integration in the field of migration
Guidelines for assessing risk integration in the field of migration

Risk Treatment and Action Plan

  • Post published:September 10, 2024
  • Post category:Risk Assessment/Toolkit

The next step after having identified, analysed and evaluated the risks involves…

Continue ReadingRisk Treatment and Action Plan
Risk Treatment and Action Plan

How to use the Risk Impact-Probability Matrix?

  • Post published:September 10, 2024
  • Post category:Risk Assessment/Toolkit

The risk probability matrix, also known as a risk heat map, helps…

Continue ReadingHow to use the Risk Impact-Probability Matrix?
How to use the Risk Impact-Probability Matrix?

What are risk impact factors?

  • Post published:September 10, 2024
  • Post category:Risk Assessment/Toolkit

Risk impacts is a core component of the risk assessment process.Risk impact…

Continue ReadingWhat are risk impact factors?
What are risk impact factors?

CRiTERIA Risk identification

  • Post published:September 10, 2024
  • Post category:Risk Assessment/Toolkit

High quality information and deep knowledge of migration-related risks and their internal…

Continue ReadingCRiTERIA Risk identification
CRiTERIA Risk identification

Recommendations on improving existing risk assessment frameworks in the field of irregular migration and human smuggling

  • Post published:September 6, 2024
  • Post category:Risk Assessment/Toolkit

There are different types of risk assessment tools used across the humanitarian…

Continue ReadingRecommendations on improving existing risk assessment frameworks in the field of irregular migration and human smuggling
Recommendations on improving existing risk assessment frameworks in the field of irregular migration and human smuggling

What are the key components of risk assessment in the field of migration?

  • Post published:September 6, 2024
  • Post category:Risk Assessment/Toolkit

Risk assessment regarding irregular migration involves identifying, analysing, and evaluating various risks…

Continue ReadingWhat are the key components of risk assessment in the field of migration?
What are the key components of risk assessment in the field of migration?
  • 1
  • 2
  • Go to the next page

Recent Posts

  • Human Security Filter – Open-Source Information
  • Human Security Filter – Correlations
  • Human Security Filter – Composite Indicator
  • OSINT applications for law enforcement agencies
  • Introduction to OSINT for humanitarian practitioners

Recent Comments

    Archives

    • September 2024
    • June 2022
    • May 2022
    • April 2022
    • February 2022
    • January 2022
    • December 2021
    • November 2021
    • October 2021
    • August 2021
    • July 2021
    • June 2021
    • May 2021
    • April 2021
    • January 2021
    • November 2020
    • August 2020
    • April 2020
    • March 2020
    • November 2019
    • August 2019

    Categories

    • Automation
    • Events
    • Human Rights
    • Media Usage
    • News
    • OSINT
    • Perception Model
    • Publication
    • Risk Assessment
    • Threat Analysis
    • Toolkit
    • Training
    • Video

    Meta

    • Log in
    • Entries feed
    • Comments feed
    • WordPress.org

    Migration-Related Risks Caused by Misconceptions of Opportunities and Requirement

    MIRROR has received funding from the European Union’s Horizon 2020 research and innovation action program under grant agreement No 832921.
    Follow us:
    Linkedin Twitter

    © All rights reserved

    Imprint | Privacy Policy

    Manage Cookie Consent
    We use cookies to optimize our website and our service.
    Functional Always active
    The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
    Preferences
    The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
    Statistics
    The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
    Marketing
    The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
    Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
    View preferences
    {title} {title} {title}