• The Workshop
    • What is integrated security?
      • The issues
      • Consequences
      • Full circle
      • Recognizing strategies
    • Creating a framework
    • Core workshop elements
    • Who should read and use this manual?
  • Facilitation method
    • Workshop objectives
    • Creating a safe space
      • Choosing a workshop venue
      • Seating arrangements
      • Offering support
      • Use of workshop space
      • Creating atmosphere
      • Nature as a resource
      • The importance of fun
      • Common language
    • Facilitation
      • Who should facilitate an integrated security workshop?
      • What qualities make for a good facilitator?
      • Preparation tips
      • Group dynamics
    • Assessing context, priorities and learning styles
      • Organisational interviews and discussions
      • Relevant document review
      • Individual participant interviews
      • Immediately before and during the workshop
  • Workshop themes
    • The workshop basics
      • Examples of priority issues
    • Detailed sessions
      • Day One
        • Session 1
          • Welcome
          • Opening ceremony
        • Session 2
          • Introductions and expectations
          • Workshop overview
        • Session 3
          • Defining security for ourselves
          • Integrated security presentation
        • Session 4
          • Threats presentation
          • Threats brainstorm: assessing risk: threats, vulnerabilities, capacities
          • Threats group work: assessing risk: threats, vulnerabilities, capacities
      • Day Two
        • Session 5
        • Session 6
          • Strategies presentation
          • Developing strategies
        • Session 7
          • How do I use my time?
          • Integrated wellness and safety strategies
      • Day Three
        • Session 8
        • Session 9
        • Session 10
        • Session 11
        • Session 12
    • Sample workshop structure
  • Facilitator’s Toolkit
    • Integrated wellness exercises
      • My pillars
      • Pillars personal plan
      • The River
      • Well-being barometer
      • Body map
      • Finger holds for managing emotions
      • Hara breathing
    • Threats exercises
      • Example text for introducing threats
      • Threats assessment
      • Defining the threshold of acceptable risk
    • Alternative exercises
      • Opening ceremony
      • Archetypes: who did I bring into this room?
      • Talking about our passion: why I became an activist
      • What do I want from myself? From the group?
      • When was the last time I...?
      • Speaking the unspoken
      • I have the power
      • Lineage line
      • Letting go and commitments
    • Ice-breakers
      • Calling out names
      • Core movement
      • Trust and boundaries
      • Miming
      • Circle massage
      • Human knot
      • Reciprocity web
      • Goodbye cocktail party
    • Additional Sessions
      • Session: Power
        • Power session
        • Power relationships
      • Session: Family
        • Family session
        • Family challenges and strategies
        • Violence in couples
      • Session: Our bodies
        • Our bodies
        • Taking time for pleasure
        • Right to rest
  • About the Manual
    • Background
    • About the author
    • Dedication
    • Acknowledgements
    • Project Partners
    • Download this manual
  • Read More
    • Companion materials
    • Bibliography
    • Resources
      • International organisations that may provide security grants
      • International protection mechanisms for human rights defenders
Home / About the Manual / Download this manual

Download this manual

  • Integrated security: the manual – Full version >>
  • Integrated security: the manual – Day One >>
  • Integrated security: the manual – Day Two >>
  • Integrated security: the manual – Day Three >>
  • Integrated security: the manual – Facilitator's Toolkit >>
Print
Page

About the Manual

  • Background
  • About the author
  • Dedication
  • Acknowledgements
  • Project Partners
  • Download this manual

Download Integrated Security
– the manual (pdf)

Facebook Twitter del.icio.us
© Kvinna till Kvinna 2011, All rights Reserved.