SlideShare uma empresa Scribd logo
1 de 29
Human Rights Monitoring, Fact-Finding and Documentation
MONITORING, FACT-FINDING & DOCUMENTATION ,[object Object],[object Object],[object Object],[object Object]
The cooking analogy
 
 
Monitoring ,[object Object],[object Object]
Elements of Monitoring: ,[object Object],[object Object],[object Object],[object Object],[object Object]
Example of a Norm ,[object Object],[object Object]
[object Object],[object Object],[object Object],Monitoring Gaps DOMESTIC  STANDARDS DOMESTIC  APPLICATION UNIVERSAL  STANDARDS
Types of Monitoring ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Scope of Monitoring Monitoring may be broad or narrow in its scope, varying in terms of… ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Why Monitor? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Monitoring Purposes (Including, but not Limited to…) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Primary Monitoring Methodologies   ,[object Object],[object Object],[object Object]
Indicators-Based Methodology ,[object Object],[object Object],[object Object],[object Object],[object Object]
Events-Based Methodology “A single case of killing is one too many.” ,[object Object],[object Object],[object Object],[object Object],[object Object]
INDICATORS-BASED METHODOLOGY EVENTS/ACTS-BASED METHODOLOGY RIGHT TO HEALTH MORTALITY RATE CASES OF DENIAL OF TREATMENT SURVEYS, CENSUS INVESTIGATION AND DOCUMENTATION OF EVENTS
Events Methodology’s Main Problems ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What are human rights violations? ,[object Object],[object Object],[object Object],[object Object]
Obligation to Respect ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Obligation to Protect ,[object Object],[object Object],[object Object]
Obligation to Fulfil ,[object Object],[object Object],[object Object]
Basic Elements of a Human Rights Violation Case PERPETRATOR ACT VICTIM
An event may consist of: ,[object Object],[object Object],[object Object],[object Object]
Names of Types of Acts ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Varying Durations of Events ,[object Object],[object Object],[object Object],[object Object]
Rights of Arrested/Accused: ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Who is a victim?
Perpetrator Characteristics ,[object Object],[object Object],[object Object],[object Object],[object Object]

Mais conteúdo relacionado

Semelhante a Monitoring Intro Huridocs

Irm ethical issues 2011 12
Irm ethical issues 2011 12Irm ethical issues 2011 12
Irm ethical issues 2011 12JustinGreaves
 
[Note To complete this presentation, replace the bracketed text
[Note To complete this presentation, replace the bracketed text[Note To complete this presentation, replace the bracketed text
[Note To complete this presentation, replace the bracketed textMargenePurnell14
 
Unit 12 Crime and Effect
Unit 12 Crime and EffectUnit 12 Crime and Effect
Unit 12 Crime and Effectalisonlockhart
 
Good practice in witness protection legislation
Good practice in witness protection legislationGood practice in witness protection legislation
Good practice in witness protection legislationEUROsociAL II
 
Conceptual and methodological framework for human rights monitoring
Conceptual and methodological framework for human rights monitoringConceptual and methodological framework for human rights monitoring
Conceptual and methodological framework for human rights monitoringGhetnet Metiku
 
Major research methods
Major research methodsMajor research methods
Major research methodsDani Cathro
 
The Effect of Vehicle theft and hijacking - Dr Jaco Barkhuizen
The Effect of Vehicle theft and hijacking - Dr Jaco BarkhuizenThe Effect of Vehicle theft and hijacking - Dr Jaco Barkhuizen
The Effect of Vehicle theft and hijacking - Dr Jaco BarkhuizenTracker Connect
 
Solomon ppt Does parole work research findings and policy
Solomon ppt Does parole work research findings and policySolomon ppt Does parole work research findings and policy
Solomon ppt Does parole work research findings and policyFrancisco J. Estrada Vásquez
 
Supt.training.standard.care
Supt.training.standard.careSupt.training.standard.care
Supt.training.standard.careWSU Cougars
 
Developing A Strategy Of Action
Developing A Strategy Of ActionDeveloping A Strategy Of Action
Developing A Strategy Of ActionThomas Müller
 
Peter Joyce “Policing Protest Since 1945: Publishing Academic Textbooks”
Peter Joyce “Policing Protest Since 1945: Publishing Academic Textbooks”Peter Joyce “Policing Protest Since 1945: Publishing Academic Textbooks”
Peter Joyce “Policing Protest Since 1945: Publishing Academic Textbooks”Phil302
 
Proposal Presentaton.pptx
Proposal Presentaton.pptxProposal Presentaton.pptx
Proposal Presentaton.pptxAbulHasan86
 
Make Room for Ethics In Next Generation Interrogation Programs
Make Room for Ethics In Next Generation Interrogation ProgramsMake Room for Ethics In Next Generation Interrogation Programs
Make Room for Ethics In Next Generation Interrogation ProgramsPaul Topalian
 
Page 1 of 5 Victims’ Rights Cory P. Haberman U.docx
Page 1 of 5  Victims’ Rights Cory P. Haberman  U.docxPage 1 of 5  Victims’ Rights Cory P. Haberman  U.docx
Page 1 of 5 Victims’ Rights Cory P. Haberman U.docxalfred4lewis58146
 
Ethical Considerations in Public Health
Ethical Considerations in Public HealthEthical Considerations in Public Health
Ethical Considerations in Public HealthDr Ghaiath Hussein
 

Semelhante a Monitoring Intro Huridocs (20)

Irm ethical issues 2011 12
Irm ethical issues 2011 12Irm ethical issues 2011 12
Irm ethical issues 2011 12
 
Advocacy Process
Advocacy Process Advocacy Process
Advocacy Process
 
MJ652 CORPORATE CRIME CAPSTONE PROJECT
MJ652 CORPORATE CRIME CAPSTONE PROJECTMJ652 CORPORATE CRIME CAPSTONE PROJECT
MJ652 CORPORATE CRIME CAPSTONE PROJECT
 
[Note To complete this presentation, replace the bracketed text
[Note To complete this presentation, replace the bracketed text[Note To complete this presentation, replace the bracketed text
[Note To complete this presentation, replace the bracketed text
 
Unit 12 Crime and Effect
Unit 12 Crime and EffectUnit 12 Crime and Effect
Unit 12 Crime and Effect
 
Good practice in witness protection legislation
Good practice in witness protection legislationGood practice in witness protection legislation
Good practice in witness protection legislation
 
Conceptual and methodological framework for human rights monitoring
Conceptual and methodological framework for human rights monitoringConceptual and methodological framework for human rights monitoring
Conceptual and methodological framework for human rights monitoring
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Major research methods
Major research methodsMajor research methods
Major research methods
 
The Effect of Vehicle theft and hijacking - Dr Jaco Barkhuizen
The Effect of Vehicle theft and hijacking - Dr Jaco BarkhuizenThe Effect of Vehicle theft and hijacking - Dr Jaco Barkhuizen
The Effect of Vehicle theft and hijacking - Dr Jaco Barkhuizen
 
Solomon ppt Does parole work research findings and policy
Solomon ppt Does parole work research findings and policySolomon ppt Does parole work research findings and policy
Solomon ppt Does parole work research findings and policy
 
Supt.training.standard.care
Supt.training.standard.careSupt.training.standard.care
Supt.training.standard.care
 
WHY ARREST.pdf
WHY ARREST.pdfWHY ARREST.pdf
WHY ARREST.pdf
 
Developing A Strategy Of Action
Developing A Strategy Of ActionDeveloping A Strategy Of Action
Developing A Strategy Of Action
 
Research Ethics.pptx
Research Ethics.pptxResearch Ethics.pptx
Research Ethics.pptx
 
Peter Joyce “Policing Protest Since 1945: Publishing Academic Textbooks”
Peter Joyce “Policing Protest Since 1945: Publishing Academic Textbooks”Peter Joyce “Policing Protest Since 1945: Publishing Academic Textbooks”
Peter Joyce “Policing Protest Since 1945: Publishing Academic Textbooks”
 
Proposal Presentaton.pptx
Proposal Presentaton.pptxProposal Presentaton.pptx
Proposal Presentaton.pptx
 
Make Room for Ethics In Next Generation Interrogation Programs
Make Room for Ethics In Next Generation Interrogation ProgramsMake Room for Ethics In Next Generation Interrogation Programs
Make Room for Ethics In Next Generation Interrogation Programs
 
Page 1 of 5 Victims’ Rights Cory P. Haberman U.docx
Page 1 of 5  Victims’ Rights Cory P. Haberman  U.docxPage 1 of 5  Victims’ Rights Cory P. Haberman  U.docx
Page 1 of 5 Victims’ Rights Cory P. Haberman U.docx
 
Ethical Considerations in Public Health
Ethical Considerations in Public HealthEthical Considerations in Public Health
Ethical Considerations in Public Health
 

Mais de huridocs

Information Design
Information DesignInformation Design
Information Designhuridocs
 
Ohchr Huridocs Indicators
Ohchr Huridocs IndicatorsOhchr Huridocs Indicators
Ohchr Huridocs Indicatorshuridocs
 
Cds Isis Intro Huridocs
Cds Isis Intro HuridocsCds Isis Intro Huridocs
Cds Isis Intro Huridocshuridocs
 
Huri Search 2008 Huridocs
Huri Search 2008 HuridocsHuri Search 2008 Huridocs
Huri Search 2008 Huridocshuridocs
 
Standard Formats And Micro Thesauri Huridocs
Standard Formats And Micro Thesauri HuridocsStandard Formats And Micro Thesauri Huridocs
Standard Formats And Micro Thesauri Huridocshuridocs
 
Indicators Approach To Monitoring Huridocs
Indicators Approach To Monitoring HuridocsIndicators Approach To Monitoring Huridocs
Indicators Approach To Monitoring Huridocshuridocs
 

Mais de huridocs (6)

Information Design
Information DesignInformation Design
Information Design
 
Ohchr Huridocs Indicators
Ohchr Huridocs IndicatorsOhchr Huridocs Indicators
Ohchr Huridocs Indicators
 
Cds Isis Intro Huridocs
Cds Isis Intro HuridocsCds Isis Intro Huridocs
Cds Isis Intro Huridocs
 
Huri Search 2008 Huridocs
Huri Search 2008 HuridocsHuri Search 2008 Huridocs
Huri Search 2008 Huridocs
 
Standard Formats And Micro Thesauri Huridocs
Standard Formats And Micro Thesauri HuridocsStandard Formats And Micro Thesauri Huridocs
Standard Formats And Micro Thesauri Huridocs
 
Indicators Approach To Monitoring Huridocs
Indicators Approach To Monitoring HuridocsIndicators Approach To Monitoring Huridocs
Indicators Approach To Monitoring Huridocs
 

Último

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 

Último (20)

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 

Monitoring Intro Huridocs