Human trafficking" brings to mind gangsters forcing people, often women and girls, to engage in dangerous activities against their will, under threat of violence. However, human trafficking is not limited to the sex trade, and this picture is inadequate. It occurs in many different industries---domestic service, construction, factory labour, on farms and fishing boats---and targets people from all over the globe. Human trafficking is a much more complicated and nuanced picture than its common representations. Victims move through multiple categories along their journey and at their destination, shifting from smuggled migrant to trafficking victim and back again several times. The emergence of a criminal pyramid scheme also makes many victims complicit in their own exploitation. Finally, the threat posed by the involvement of organised crime is little understood. The profit motives and violence that come with such crime make human trafficking more dangerous for its victims and difficult to detect or address. Drawing on field research in source, transit and destination countries, the authors analyse trafficking from four countries: Albania, Eritrea, Nigeria and Vietnam. What emerges is a business model that evolves in response to changes in legislation, governance and law enforcement capacities.
This book critically examines the security-development nexus through an analysis of organised crime responses in post-conflict states. As the trend has evolved, the security-development nexus has received significant attention from policymakers as a new means to address security threats. Integrating the traditionally separate areas of security and development, the nexus has been promoted as a new strategy to achieve a comprehensive, people-centred approach. Despite the enthusiasm behind the security-development nexus, it has received significant criticism. This book investigates four tensions that influence the integration of security and development to understand why it has failed to live up to expectations. The book compares two case studies of internationally driven initiatives to address organised crime as part of post-conflict reconstruction in Sierra Leone and Bosnia. Examination of the tensions reveals that actors addressing organised crime have attempted to move away from a security approach, resulting in incipient integration between security and development, but barriers remain. Rather than discarding the nexus, this book explores its unfulfilled potential. This book will be of much interest to students of war and conflict studies, development studies, criminology, security studies and IR in general.
This edited volume examines the implications for international development actors of new kinds of terrorism taking place in civil conflicts. The threat from terrorism and violent extremism has never been greater – at least in the global South where the vast majority of violent extremist attacks take place. Some of the most violent extremist groups are also parties to civil conflicts in regions such as the Middle East and the Horn of Africa. But are these groups – especially the violent Islamists which constitute the greatest current threat – qualitatively different from other conflict actors? If they are, what are the implications for development practitioners working in war zones and fragile or poverty-afflicted countries? This study aims to answer these questions through a combination of theoretical enquiry and the investigation of three case studies – Kenya, Nigeria, and Iraq/Syria. It aims to illuminate the differences between violent Islamists and other types of conflict actor, to identify the challenges these groups pose to development practice, and to propose a way forward for meeting these challenges.
This will help us customize your experience to showcase the most relevant content to your age group
Please select from below
Login
Not registered?
Sign up
Already registered?
Success – Your message will goes here
We'd love to hear from you!
Thank you for visiting our website. Would you like to provide feedback on how we could improve your experience?
This site does not use any third party cookies with one exception — it uses cookies from Google to deliver its services and to analyze traffic.Learn More.