The main objective of this study is to analyze the role of
Information Communication technology in facilitating human
trafficking in Rwanda. Specifically,
(1) To analyze the influence of technology in facilitating
human trafficking in Rwanda.
(2) To analyze the extent to which Rwanda has been able to
combat human trafficking using technology.
This document summarizes a report by the UN Special Rapporteur on the right to freedom of opinion and expression regarding targeted digital surveillance. The report finds that targeted surveillance of journalists, activists and critics by governments has led to human rights violations like arbitrary detention and even extrajudicial killings. It proposes regulations for the private surveillance industry to help protect human rights and calls for a moratorium on the global sale of surveillance tools until proper safeguards are in place.
The document summarizes internet filtering in Iran. It discusses:
1) Iran has one of the most extensive internet filtering systems in the world, with a centralized system augmenting filtering at the ISP level. It now uses domestically produced technology to identify and block sites.
2) Speech is heavily regulated in Iran, with limits on topics like religion, morality, politics. The internet was initially less regulated but is now more closely monitored, especially after the 2009 elections.
3) Efforts to control online speech rely on filtering and legal threats. New regulatory agencies have been created and the Revolutionary Guard now plays an active role in enforcement. This exacerbates self-censorship online.
Navigating Indonesia's Information HighwayICT Watch
This document provides an overview of internet freedom standards and issues related to regulating online content in Indonesia. It discusses how Indonesia has made progress on freedom of expression since 1998 but also increased attempts to crack down on internet freedoms. Laws around pornography, defamation, blasphemy and a pending cybercrime bill threaten online speech. The report examines internet filtering, access issues, and recommends legal reforms to bring laws in line with international standards on freedom of expression.
The four countries assessed - Egypt, Morocco, Palestine and Yemen - have committed to international standards on access to information through treaties. However, none have fully implemented these commitments domestically. While Yemen has passed an access to information law, it has not been implemented. Morocco's constitutional right to information and draft law are positive steps. Overall, lack of strong access to information laws and effective implementation in the region limit people's ability to obtain information and fight corruption. Governments should prioritize passing and implementing robust access to information laws that meet international standards to promote transparency, accountability and curb corruption.
An Exploratory Study on Mechanisms in Place to Combat Hacking In South Africa...AJHSSR Journal
ABSTRACT: In the past two decades, third world countries such as South Africa have made steadily developments towards combating hacking as a form of Cybercrime. The developments made by the South African Criminal Justice towards the prevention of hacking have been mildly progressive. The Council of Europe Convention on Cybercrime is the treaty that all South African legislation and policy with regard to hacking is required to be in line with this convention. This treaty has also been the cornerstone to first world countries such as the United States, when preventing cybercrime such as hacking. In order for South Africans to have a safe and secure cyberspace that is free from hackers; there needs to be a co-operative system put in place by the South African Criminal Justice System that involves the government, non-profit organizations and the community. A Criminal Justice system that works closely with the community is able to properly guide its members and correctly prosecute the crime of hacking. Therefore, using qualitative secondary data this paper explores the existing measures put in place by the South African Criminal Justice to combat hacking. The findings of this paper indicate that conceptual understanding of this crime (hacking) can play a pivotal role in addressing the manifestation of this crime in a large extent as the nature and extent can be established, the use of technological means also contribute to hacking, this is also linked to individuals (victims) ignorance. For recommendations, the use of technology and conventional method in awareness can help in responding to the scale and consequence of hacking in South Africa.
Smart Power, Mobile Phone Technology and Philanthropocapitalism in Africa & M...Laurence Allard
conférence au Colloque International Democracy Promotion and Nation Building in United States Foreign Policy. The U.S. Model Reconsidered, From the Post-Cold War Balkans to the Arab Revolts, 18 Octobre 2012, Université Paris 3/The German Marshall Fund of the Unites States
Whistle blowing is an act aimed at unveiling or exposing gross misdeed associated with services rendered in public or private institutions. These acts which constitutes diverse dimensions of crimes popularly referred to as corruption has obviously eaten deep into the fabrics of virtually every sector of our economy including university education system. It is pathetic but frankly to remark that this imbroglio characterizing the society has remained unabated due to absence of secure reporting line. Hence, the development of Whistle-Blowing System with secure electronic avenue for reporting every act or conduct that contradicts and compromises ethical provisions. It creates seamless link to enroll prospective whistle-blowers, accepts documented reports with verifiable evidence, allows communication with investigators, protects whistle-blower’s identity and interfaces them for due rewards. The system development process adopted the object-oriented methodology with its tools such as use-case diagram, sequence diagram and flowcharts. Implementation protocol utilized a combination of Javascript/php/HTML at the front-end while MySQL was engaged at the back-end for appropriate data documentation. It is suited with enormous prospects for assisting management trap down most of the sharp practices and inconsequentialities inherent in most Nigerian universities by accepting user identity, the reports and processes same to specifications.
e-Governance Implementation In Ebonyi State Nigeria: Challenges and ProspectsEditor IJCATR
The deployment of Information and Communication Technology (ICT) in different facets of the world’s economy has yielded very reasonable results. ICT has blured the barriers of hinderances in tourism, trade, healthcare, education and training. In governance and administration, ICT applications have enhanced the delivery of public services to citizens and clients not only by improving the process and management of government, but also by redefining the traditional concepts of citizenship. This paper examined the challenges facing the implementation of e-Governance in Ebonyi State – Nigeria and highlights the prospects. The research used a primary source of data by distributing, collecting and analysing a total of 500 questionnaires administered to respondents in the research area (Ebonyi State). The research found that the most difficult challenges facing the deployment of e-governance in Ebonyi State were lack of steady power supply, poor communication infrastructure and high cost of computer and internet equipments. The survey also revealed that the use of e-governance would bring improved efficiency in government operations without necessarily increasing the cost of state governance. e-Governance would strengthen democratic principles and ideologies which inturn brings good governance to the people.
This document summarizes a report by the UN Special Rapporteur on the right to freedom of opinion and expression regarding targeted digital surveillance. The report finds that targeted surveillance of journalists, activists and critics by governments has led to human rights violations like arbitrary detention and even extrajudicial killings. It proposes regulations for the private surveillance industry to help protect human rights and calls for a moratorium on the global sale of surveillance tools until proper safeguards are in place.
The document summarizes internet filtering in Iran. It discusses:
1) Iran has one of the most extensive internet filtering systems in the world, with a centralized system augmenting filtering at the ISP level. It now uses domestically produced technology to identify and block sites.
2) Speech is heavily regulated in Iran, with limits on topics like religion, morality, politics. The internet was initially less regulated but is now more closely monitored, especially after the 2009 elections.
3) Efforts to control online speech rely on filtering and legal threats. New regulatory agencies have been created and the Revolutionary Guard now plays an active role in enforcement. This exacerbates self-censorship online.
Navigating Indonesia's Information HighwayICT Watch
This document provides an overview of internet freedom standards and issues related to regulating online content in Indonesia. It discusses how Indonesia has made progress on freedom of expression since 1998 but also increased attempts to crack down on internet freedoms. Laws around pornography, defamation, blasphemy and a pending cybercrime bill threaten online speech. The report examines internet filtering, access issues, and recommends legal reforms to bring laws in line with international standards on freedom of expression.
The four countries assessed - Egypt, Morocco, Palestine and Yemen - have committed to international standards on access to information through treaties. However, none have fully implemented these commitments domestically. While Yemen has passed an access to information law, it has not been implemented. Morocco's constitutional right to information and draft law are positive steps. Overall, lack of strong access to information laws and effective implementation in the region limit people's ability to obtain information and fight corruption. Governments should prioritize passing and implementing robust access to information laws that meet international standards to promote transparency, accountability and curb corruption.
An Exploratory Study on Mechanisms in Place to Combat Hacking In South Africa...AJHSSR Journal
ABSTRACT: In the past two decades, third world countries such as South Africa have made steadily developments towards combating hacking as a form of Cybercrime. The developments made by the South African Criminal Justice towards the prevention of hacking have been mildly progressive. The Council of Europe Convention on Cybercrime is the treaty that all South African legislation and policy with regard to hacking is required to be in line with this convention. This treaty has also been the cornerstone to first world countries such as the United States, when preventing cybercrime such as hacking. In order for South Africans to have a safe and secure cyberspace that is free from hackers; there needs to be a co-operative system put in place by the South African Criminal Justice System that involves the government, non-profit organizations and the community. A Criminal Justice system that works closely with the community is able to properly guide its members and correctly prosecute the crime of hacking. Therefore, using qualitative secondary data this paper explores the existing measures put in place by the South African Criminal Justice to combat hacking. The findings of this paper indicate that conceptual understanding of this crime (hacking) can play a pivotal role in addressing the manifestation of this crime in a large extent as the nature and extent can be established, the use of technological means also contribute to hacking, this is also linked to individuals (victims) ignorance. For recommendations, the use of technology and conventional method in awareness can help in responding to the scale and consequence of hacking in South Africa.
Smart Power, Mobile Phone Technology and Philanthropocapitalism in Africa & M...Laurence Allard
conférence au Colloque International Democracy Promotion and Nation Building in United States Foreign Policy. The U.S. Model Reconsidered, From the Post-Cold War Balkans to the Arab Revolts, 18 Octobre 2012, Université Paris 3/The German Marshall Fund of the Unites States
Whistle blowing is an act aimed at unveiling or exposing gross misdeed associated with services rendered in public or private institutions. These acts which constitutes diverse dimensions of crimes popularly referred to as corruption has obviously eaten deep into the fabrics of virtually every sector of our economy including university education system. It is pathetic but frankly to remark that this imbroglio characterizing the society has remained unabated due to absence of secure reporting line. Hence, the development of Whistle-Blowing System with secure electronic avenue for reporting every act or conduct that contradicts and compromises ethical provisions. It creates seamless link to enroll prospective whistle-blowers, accepts documented reports with verifiable evidence, allows communication with investigators, protects whistle-blower’s identity and interfaces them for due rewards. The system development process adopted the object-oriented methodology with its tools such as use-case diagram, sequence diagram and flowcharts. Implementation protocol utilized a combination of Javascript/php/HTML at the front-end while MySQL was engaged at the back-end for appropriate data documentation. It is suited with enormous prospects for assisting management trap down most of the sharp practices and inconsequentialities inherent in most Nigerian universities by accepting user identity, the reports and processes same to specifications.
e-Governance Implementation In Ebonyi State Nigeria: Challenges and ProspectsEditor IJCATR
The deployment of Information and Communication Technology (ICT) in different facets of the world’s economy has yielded very reasonable results. ICT has blured the barriers of hinderances in tourism, trade, healthcare, education and training. In governance and administration, ICT applications have enhanced the delivery of public services to citizens and clients not only by improving the process and management of government, but also by redefining the traditional concepts of citizenship. This paper examined the challenges facing the implementation of e-Governance in Ebonyi State – Nigeria and highlights the prospects. The research used a primary source of data by distributing, collecting and analysing a total of 500 questionnaires administered to respondents in the research area (Ebonyi State). The research found that the most difficult challenges facing the deployment of e-governance in Ebonyi State were lack of steady power supply, poor communication infrastructure and high cost of computer and internet equipments. The survey also revealed that the use of e-governance would bring improved efficiency in government operations without necessarily increasing the cost of state governance. e-Governance would strengthen democratic principles and ideologies which inturn brings good governance to the people.
Mobile phones, human rights and social justice in africaDr Lendy Spires
This document summarizes research conducted on the use of mobile phones by civil society organizations in Africa for human rights and social justice work. Over 50 organizations were identified that are using mobile phones for communication, networking, advocacy and services, though the actual number is likely much higher. While mobile phones have enabled unprecedented connectivity, organizations still face challenges like high costs, lack of electricity in rural areas, and limited technical capacity. The workshop this document refers to aims to help organizations overcome isolation, share experiences using mobile technology, and establish an ongoing support network.
GRBN Trust and Personal Data Survey report - Part 1 - Concern, familiarity, t...Andrew Cannon
A detailed report on the results from GRBN's 24 country global survey on the issue of Trust & Personal Data. The report dives into how the level of familiarity with the issue as well as the level of concern about the abuse of personal data varies across the globe. The report compares how trustworthy people consider different types of both public and private organisations to be, and looks at how sensitive people consider different types of personal data to be.
2010-06 analysis of laws inconsistent with human rights in uganda_hurinetAlex Taremwa
This document analyzes laws in Uganda that are inconsistent with the right of access to information as established in Uganda's Access to Information Act of 2005. It focuses on analyzing key provisions of the Official Secrets Act, Evidence Act, and Parliamentary Powers and Privileges Act that contradict the right of access to information. The analysis finds that the Official Secrets Act contains overly broad and ambiguous definitions of classified information and official documents that can be used to unjustifiably withhold information. It also recommends amendments to laws like the Official Secrets Act to harmonize them with Uganda's constitutional right of access to information.
Analysing the role_of (2) Relation Sandro Suzart SUZART GOOGLE INC Uni...Sandro Suzart
relationship between Sandro Suzart SUZART GOOGLE INC and United States on Demonstrations 2013 and Impeachments of 22 governments Relation, Sandro Suzart, SUZART, GOOGLE INC, United States on Demonstrations countries IMPEACHMENT GOOGLE INC
This document summarizes an April 1, 2011 workshop on understanding digital trends and changes in media consumption. The workshop covered how the internet and technology have revolutionized how people access and consume media. It discussed trends like increased smartphone and tablet adoption, social media usage, and online video consumption. It provided data on technology adoption rates and online behaviors of local consumers. The workshop aimed to help businesses understand digital opportunities and leverage free online tools to improve marketing effectiveness.
IGF Hyderabad - Index of Global Internet FreedomFreedom House
The document summarizes the Index of Global Internet Freedom (IGIF) pilot study. It finds that while some repressive governments allow internet freedom, many are increasing censorship and monitoring. IGIF aims to measure obstacles to access, limits on content and communication, and violations of individual online rights in countries. The pilot study of 15 countries found some repressive states scored better on internet freedom than traditional media freedom. IGIF can help track trends in restrictions and advocacy responses over time.
Technology for Human Trafficking and sexual exploitation - Trace Projects Fin...Trilateral Research
The document discusses findings from the TRACE project regarding the use of technology to facilitate and combat human trafficking and sexual exploitation. It examines how perpetrators use the internet, social media, and devices to recruit and exploit victims, and how law enforcement utilizes technologies like databases and data analytics to investigate cases and disrupt criminal networks. The document also explores how technologies can help prevent trafficking through education campaigns and monitoring. Overall, it provides an overview of current and potential future trends in the role of technology in human trafficking.
The document discusses the right to be forgotten and the debates around privacy, free speech, and transparency on the internet. It argues that while search engines currently act as judges in removing personal information, they do so opaquely and are motivated by commercial interests rather than fairness. True freedom of information requires regulation of internet companies and democratic processes for individuals to request accurate contextualization or removal of harmful private details. Extending rights to remove sensitive personal data globally could help address issues like online harassment while respecting both privacy and free speech.
The document discusses the history of censorship and access to information. It covers how totalitarian states censor information at the production point while capitalism censors at the distribution point. It also discusses cases like IBM aiding apartheid South Africa and hackers providing alternative technologies in response. The concept of information wanting to be free is explored, with the tension between information being valuable yet the cost to access it decreasing. South Africa's constitution protects access to information and privacy.
Global mobile data traffic grew 159% in 2010, nearly tripling for the third year in a row. Smartphones represented only 13% of devices but 78% of traffic, with average usage doubling to 79MB per month. By 2015, mobile data traffic is forecast to increase 26-fold, reaching 6.3 exabytes per month, with two-thirds being video, average smartphone usage rising to 1.3GB, and nearly one device per person globally.
A presentation by Pier Luigi Parcu on Artificial Intelligence, elections, media pluralism and media freedom at the European Artificial Intelligence Observatory April 2, 2019
This paper examined technologies being used in crime prevention and detection with a view to
identifying such technologies, legal issues and the challenges involved in the application of these technologies
and attempted to forge an acceptable legal framework for the use of technologies in crime prevention and
detection in Nigeria. Both primary and secondary sources of data were used. Primary sources include books,
journal, publications, dailies, conventions and a host others. Secondary sources include materials sourced from
the internet. The study revealed that though there are quite a good number of technologies for crime prevention
and detection, the major issues involved are the human right abuse and the challenges of training the staff who
are expected to apply these technologies among others. The study concluded that though there is need to
employ sophisticated technologies in view of the alarming rate of crime commission worldwide and particularly
in Nigeria , however, these technologies need to be reviewed to soften the hardship and human right abuses
which are found in the application of the technologies. This can be achieved by putting in place an acceptable
world standard and robust legal framework that would help in the mitigation of hardship and human abuses
that are embedded in the application of the technologies.
GRBN Trust and Personal Data Survey Report - Part 2 - Regions and countries -...Andrew Cannon
The report deep dives into the results from GRBN's 24 country survey on Trust & Personal Data, detailing the findings by region (Americas, APAC and Europe) and country
This paper furthers the analysis presented in the previous working paper, “Reflections on the Fog of (Cyber)War” (Canabarro & Borne, 2013), by assessing the Brazilian approach to cybersecurity. It analyses some of the most important documents on security issued by the Brazilian government since redemocratization in order to access the adequacy of its policy in the light of the controversies presented before.The paper first pictures cyberspace in Brazil and introduces three landmark documents that guide security policy towards it: the (a) National Strategy of Defense, the (b) White Paper to Guide Future Defense Priorities, and the (c) Green Book on Brazil’s Cybersecurity. Finally,the paper presents some remarks on both the positive and negative aspects of the policy.
This document discusses using an interdisciplinary approach to address the complex issue of human sex trafficking. It draws on the disciplines of information technology, general business, and organizational leadership. Information technology can help by using data mining and security techniques to identify patterns and track traffickers online. General business principles can provide insights into the market dynamics of trafficking. Organizational leadership is needed to manage collaborative efforts across different groups working on this issue. While conflicts may arise from other disciplines, an interdisciplinary team incorporating these three areas could help reduce and prevent trafficking by utilizing technological tools and data, understanding the business of trafficking, and coordinating organizational responses.
The document discusses using project management and technology to address domestic minor sex trafficking. It notes that a diverse committee was formed in 2011 to address the problem, and that a project manager would be valuable to oversee the varied backgrounds and perspectives involved. Stage 1 of the plan would involve research and training to develop programs to address the issue. The document also discusses how information technology could be leveraged to collect data, monitor trafficking activity, and help law enforcement respond more effectively given the role of the internet and mobile devices in facilitating trafficking. While technology enables trafficking, it could also be used as part of the solution if developed and applied carefully and ethically.
This document discusses cybercrime and human trafficking in Mexico. It finds that social networks and the internet are now primary means for human traffickers to target victims. Mexico has become the second largest center for human trafficking in the world, much of which involves the sexual exploitation of women and children. The document recommends ways for people to protect themselves online and urges the Mexican government to strengthen laws against human trafficking and prioritize protecting victims.
State-sponsored trolling refers to governments using targeted online harassment campaigns to silence critics. The authors studied this phenomenon in multiple countries over 18 months. They define key terms and propose a framework to attribute trolling attacks to states based on the level of state involvement. Case studies from 7 countries show how governments execute, direct, incite, or leverage trolling. The paper concludes with policy recommendations, including for technology companies to curb abuse and respect human rights.
PRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdflinda gichohi
This is an article/blog on the Privacy Symposium Africa 2022 on Privacy Rights and Digital rights as Human Rights. It also talks about Online Gender Based Violence , this is gender based violence that manifests in the Digital Space and Online world ie; phishing, non-consensual sharing, harrassment. This article explains why Privacy rights are essential in the modern world.
Essay on Cyber Crime and Cyber Law
Essay on CyberCrime
Cyber Crime Essay
Cyber Crime : A Crime
Cybercrime: Two Case Studies
Literature Review On Cyber Crime
Cyber Crime And Transnational Crime Essay
Essay on Cyber Crime and National Security
Cyber Crime Essay
CyberCrime Essay
Cyber Crime Essay
The Issue Of Cyber Crimes Essay
Essay on Introduction to Computer Crime
Essay about CyberCrime and Terrorism
Pros And Disadvantages Of Cyber Crime Essay
Internet Crime Essay
Cyber Crime
Cyber-Crime is a Serious Problem Essay examples
Advantages And Disadvantages Of Cyber Crime
Cyber Crime Essay
New and emerging forms of crime threats the world must reckon withDr Lendy Spires
The document discusses new and emerging forms of crime that threaten the world. Technological advancements, globalization, and growing markets have enabled criminal activities online and across borders, making detection and prevention more challenging. New crimes mentioned include cybercrime, environmental crime, trafficking of cultural property, and piracy. Factors driving the emergence of these crimes include globalization, proximity of poverty/conflict to markets, and new technologies. The document advocates raising awareness, addressing vulnerabilities, and utilizing technology to help law enforcement while recognizing crimes will continue evolving with globalization and technology.
Mobile phones, human rights and social justice in africaDr Lendy Spires
This document summarizes research conducted on the use of mobile phones by civil society organizations in Africa for human rights and social justice work. Over 50 organizations were identified that are using mobile phones for communication, networking, advocacy and services, though the actual number is likely much higher. While mobile phones have enabled unprecedented connectivity, organizations still face challenges like high costs, lack of electricity in rural areas, and limited technical capacity. The workshop this document refers to aims to help organizations overcome isolation, share experiences using mobile technology, and establish an ongoing support network.
GRBN Trust and Personal Data Survey report - Part 1 - Concern, familiarity, t...Andrew Cannon
A detailed report on the results from GRBN's 24 country global survey on the issue of Trust & Personal Data. The report dives into how the level of familiarity with the issue as well as the level of concern about the abuse of personal data varies across the globe. The report compares how trustworthy people consider different types of both public and private organisations to be, and looks at how sensitive people consider different types of personal data to be.
2010-06 analysis of laws inconsistent with human rights in uganda_hurinetAlex Taremwa
This document analyzes laws in Uganda that are inconsistent with the right of access to information as established in Uganda's Access to Information Act of 2005. It focuses on analyzing key provisions of the Official Secrets Act, Evidence Act, and Parliamentary Powers and Privileges Act that contradict the right of access to information. The analysis finds that the Official Secrets Act contains overly broad and ambiguous definitions of classified information and official documents that can be used to unjustifiably withhold information. It also recommends amendments to laws like the Official Secrets Act to harmonize them with Uganda's constitutional right of access to information.
Analysing the role_of (2) Relation Sandro Suzart SUZART GOOGLE INC Uni...Sandro Suzart
relationship between Sandro Suzart SUZART GOOGLE INC and United States on Demonstrations 2013 and Impeachments of 22 governments Relation, Sandro Suzart, SUZART, GOOGLE INC, United States on Demonstrations countries IMPEACHMENT GOOGLE INC
This document summarizes an April 1, 2011 workshop on understanding digital trends and changes in media consumption. The workshop covered how the internet and technology have revolutionized how people access and consume media. It discussed trends like increased smartphone and tablet adoption, social media usage, and online video consumption. It provided data on technology adoption rates and online behaviors of local consumers. The workshop aimed to help businesses understand digital opportunities and leverage free online tools to improve marketing effectiveness.
IGF Hyderabad - Index of Global Internet FreedomFreedom House
The document summarizes the Index of Global Internet Freedom (IGIF) pilot study. It finds that while some repressive governments allow internet freedom, many are increasing censorship and monitoring. IGIF aims to measure obstacles to access, limits on content and communication, and violations of individual online rights in countries. The pilot study of 15 countries found some repressive states scored better on internet freedom than traditional media freedom. IGIF can help track trends in restrictions and advocacy responses over time.
Technology for Human Trafficking and sexual exploitation - Trace Projects Fin...Trilateral Research
The document discusses findings from the TRACE project regarding the use of technology to facilitate and combat human trafficking and sexual exploitation. It examines how perpetrators use the internet, social media, and devices to recruit and exploit victims, and how law enforcement utilizes technologies like databases and data analytics to investigate cases and disrupt criminal networks. The document also explores how technologies can help prevent trafficking through education campaigns and monitoring. Overall, it provides an overview of current and potential future trends in the role of technology in human trafficking.
The document discusses the right to be forgotten and the debates around privacy, free speech, and transparency on the internet. It argues that while search engines currently act as judges in removing personal information, they do so opaquely and are motivated by commercial interests rather than fairness. True freedom of information requires regulation of internet companies and democratic processes for individuals to request accurate contextualization or removal of harmful private details. Extending rights to remove sensitive personal data globally could help address issues like online harassment while respecting both privacy and free speech.
The document discusses the history of censorship and access to information. It covers how totalitarian states censor information at the production point while capitalism censors at the distribution point. It also discusses cases like IBM aiding apartheid South Africa and hackers providing alternative technologies in response. The concept of information wanting to be free is explored, with the tension between information being valuable yet the cost to access it decreasing. South Africa's constitution protects access to information and privacy.
Global mobile data traffic grew 159% in 2010, nearly tripling for the third year in a row. Smartphones represented only 13% of devices but 78% of traffic, with average usage doubling to 79MB per month. By 2015, mobile data traffic is forecast to increase 26-fold, reaching 6.3 exabytes per month, with two-thirds being video, average smartphone usage rising to 1.3GB, and nearly one device per person globally.
A presentation by Pier Luigi Parcu on Artificial Intelligence, elections, media pluralism and media freedom at the European Artificial Intelligence Observatory April 2, 2019
This paper examined technologies being used in crime prevention and detection with a view to
identifying such technologies, legal issues and the challenges involved in the application of these technologies
and attempted to forge an acceptable legal framework for the use of technologies in crime prevention and
detection in Nigeria. Both primary and secondary sources of data were used. Primary sources include books,
journal, publications, dailies, conventions and a host others. Secondary sources include materials sourced from
the internet. The study revealed that though there are quite a good number of technologies for crime prevention
and detection, the major issues involved are the human right abuse and the challenges of training the staff who
are expected to apply these technologies among others. The study concluded that though there is need to
employ sophisticated technologies in view of the alarming rate of crime commission worldwide and particularly
in Nigeria , however, these technologies need to be reviewed to soften the hardship and human right abuses
which are found in the application of the technologies. This can be achieved by putting in place an acceptable
world standard and robust legal framework that would help in the mitigation of hardship and human abuses
that are embedded in the application of the technologies.
GRBN Trust and Personal Data Survey Report - Part 2 - Regions and countries -...Andrew Cannon
The report deep dives into the results from GRBN's 24 country survey on Trust & Personal Data, detailing the findings by region (Americas, APAC and Europe) and country
This paper furthers the analysis presented in the previous working paper, “Reflections on the Fog of (Cyber)War” (Canabarro & Borne, 2013), by assessing the Brazilian approach to cybersecurity. It analyses some of the most important documents on security issued by the Brazilian government since redemocratization in order to access the adequacy of its policy in the light of the controversies presented before.The paper first pictures cyberspace in Brazil and introduces three landmark documents that guide security policy towards it: the (a) National Strategy of Defense, the (b) White Paper to Guide Future Defense Priorities, and the (c) Green Book on Brazil’s Cybersecurity. Finally,the paper presents some remarks on both the positive and negative aspects of the policy.
This document discusses using an interdisciplinary approach to address the complex issue of human sex trafficking. It draws on the disciplines of information technology, general business, and organizational leadership. Information technology can help by using data mining and security techniques to identify patterns and track traffickers online. General business principles can provide insights into the market dynamics of trafficking. Organizational leadership is needed to manage collaborative efforts across different groups working on this issue. While conflicts may arise from other disciplines, an interdisciplinary team incorporating these three areas could help reduce and prevent trafficking by utilizing technological tools and data, understanding the business of trafficking, and coordinating organizational responses.
The document discusses using project management and technology to address domestic minor sex trafficking. It notes that a diverse committee was formed in 2011 to address the problem, and that a project manager would be valuable to oversee the varied backgrounds and perspectives involved. Stage 1 of the plan would involve research and training to develop programs to address the issue. The document also discusses how information technology could be leveraged to collect data, monitor trafficking activity, and help law enforcement respond more effectively given the role of the internet and mobile devices in facilitating trafficking. While technology enables trafficking, it could also be used as part of the solution if developed and applied carefully and ethically.
This document discusses cybercrime and human trafficking in Mexico. It finds that social networks and the internet are now primary means for human traffickers to target victims. Mexico has become the second largest center for human trafficking in the world, much of which involves the sexual exploitation of women and children. The document recommends ways for people to protect themselves online and urges the Mexican government to strengthen laws against human trafficking and prioritize protecting victims.
State-sponsored trolling refers to governments using targeted online harassment campaigns to silence critics. The authors studied this phenomenon in multiple countries over 18 months. They define key terms and propose a framework to attribute trolling attacks to states based on the level of state involvement. Case studies from 7 countries show how governments execute, direct, incite, or leverage trolling. The paper concludes with policy recommendations, including for technology companies to curb abuse and respect human rights.
PRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdflinda gichohi
This is an article/blog on the Privacy Symposium Africa 2022 on Privacy Rights and Digital rights as Human Rights. It also talks about Online Gender Based Violence , this is gender based violence that manifests in the Digital Space and Online world ie; phishing, non-consensual sharing, harrassment. This article explains why Privacy rights are essential in the modern world.
Essay on Cyber Crime and Cyber Law
Essay on CyberCrime
Cyber Crime Essay
Cyber Crime : A Crime
Cybercrime: Two Case Studies
Literature Review On Cyber Crime
Cyber Crime And Transnational Crime Essay
Essay on Cyber Crime and National Security
Cyber Crime Essay
CyberCrime Essay
Cyber Crime Essay
The Issue Of Cyber Crimes Essay
Essay on Introduction to Computer Crime
Essay about CyberCrime and Terrorism
Pros And Disadvantages Of Cyber Crime Essay
Internet Crime Essay
Cyber Crime
Cyber-Crime is a Serious Problem Essay examples
Advantages And Disadvantages Of Cyber Crime
Cyber Crime Essay
New and emerging forms of crime threats the world must reckon withDr Lendy Spires
The document discusses new and emerging forms of crime that threaten the world. Technological advancements, globalization, and growing markets have enabled criminal activities online and across borders, making detection and prevention more challenging. New crimes mentioned include cybercrime, environmental crime, trafficking of cultural property, and piracy. Factors driving the emergence of these crimes include globalization, proximity of poverty/conflict to markets, and new technologies. The document advocates raising awareness, addressing vulnerabilities, and utilizing technology to help law enforcement while recognizing crimes will continue evolving with globalization and technology.
Human trafficking incidence in rwanda its challenges, prevention and controlJohnGacinya
Rwandans like any other people in the rest of the world, suffer physically and psychologically during and after the transportation of victims of human trafficking to other parts of the world. It is observed that, occupational hazards in industries pose danger to the lives of victims of labour trafficking. It is also noted that sexually-abused victims of human trafficking risk catching HIV/AIDS pandemic. Ignorance, poverty, family conflicts and gender inequality have been found to be some of the key ‘push’ factors that drive individuals to seek economic opportunities elsewhere other than their home areas
Human Trafficking Incidence in Rwanda: Its Challenges, Prevention and ControlJohnGacinya
The main objective of the present study was to analyse the challenges faced by the Government of Rwanda its efforts to prevent and control the incidence of human trafficking in the country.
Internet Crime And Moral ResponsibilityTracy Clark
The document discusses various types of internet crimes including phishing, child pornography, cyber stalking, computer intrusion, denial of service attacks, identity theft, and whose responsibility it is to report these crimes. It describes the agencies responsible for handling crime reports which are the FBI's Internet Crime Complaint Center and the National Center for Missing and Exploited Children. The document concludes that users need to be informed about verifying emails and contacting companies directly to reduce personal information being gathered unlawfully.
250 words agree or disagreeWeek 5 ForumMaiwand Khyber(Jul .docxvickeryr87
250 words agree or disagree
Week 5 Forum
Maiwand Khyber(Jul 31, 2019 1:01 PM) - Read by: 1
Reply
Organized crime refers to the crime conducted by local, national, or international groupings. These groups are highly centralized enterprises and are run by criminals who are engaged in illegal conduct for profit intention. They have an organized hierarchy, non-ideological motives, and are governed by rules and codes (Jones and Bartlett Learning, n.d.).
Three major types of organized crime include gang criminality, racketeering, and syndicate crime. Gang criminals are usually engaged in local offense like robbery, vehicle theft, kidnapping, ransom, and murder. They are hardened criminals who are dangerous to society. Racketeering is an activity in which the criminal gang is involved in extorting money from legitimate as well as illegitimate businesses by the use of intimidation. It consists in selling adulterated commodities, deceiving people, selling spurious drugs, and so forth. Racketeers usually don’t take away all profits and share it with the owners of businesses. In return, they want fixed money from the owners of illegal activities and allow prostitution, liquor selling, and gambling to continue unabated. Syndicate crime refers to the furnishing of unlawful goods and services by organized criminal groups, often known as mafia. Illegal products include liquor and drugs, while illicit services involve trafficking of girls, gambling, and so forth.
Several groups as The Cosa Nostra, The Russian mafia, The Mexican drug cartels, and The Asian Organized Crime Groups have been considered as criminal groups involved in the organized crime at national and transnational levels. International criminal groups operate under various structures with stable hierarchies and network. They try to influence government policies by using corrupt as well as legitimate methods (The United States Department of Justice, 2015).
With changing industrial contours, organized crime has also shifted from traditional ways to tech-savvy crimes (example: cybercrime). It has exploited technological advancements and communication strategies to expand cross-border. This high-tech realm has made many crimes an international threat rather than a local danger. Today, these crimes are conducted by nimble and loosely structured groups that have a global reach. Refined telephone networks have fostered rapid communication, thereby revolutionizing the illicit commerce (Bjelopera & Finklea, 2012).
While technology has facilitated the growth of organized crime, challenges posed by technological advancements in tracking and investigating organized crime need special mention. Investigation of cases has become difficult because of the sophisticated screening options as firewalls. In a drug investigation case that was carried out jointly by the United States and Colombian authorities, it was found that the presence of the firewall made it intricate for authorities to reach them.
This document discusses the emergence of a new form of human trafficking for ransom facilitated by information and communication technologies (ICT). It began in 2009 in the Sinai region, where traffickers used torture and the threat of organ harvesting to extort ransoms from victims' families contacted by mobile phone. Between 25,000-30,000 people were victims in 2009-2013, with 20-33% dying due to the trafficking. ICT enabled intelligence gathering, ransom demands and collections, facilitating the transnational criminal network. The challenges include vulnerable people outside their communities and ineffective governance across borders.
Grant Proposal Excerpt Build Your Own NGOEricka Rodas
This document discusses the need to empower youth and protect them from sex trafficking and exploitation online. It notes that 300,000 children in the US are at risk of sexual exploitation. The organization aims to teach internet safety to at-risk youth and victims of sex trafficking to help prevent further abuse and allow them to become leaders. It also wants to train first responders to properly identify and respond to these crimes. Two bills in Congress could help if passed, but until then the risks to youth remain.
Internet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdfWAIHIGA K.MUTURI
Waihiga is a serial social entrepreneur, accredited digital journalist, and communications expert working to tackle poverty in Africa through social enterprises and stories. They have extensive experience running both online and offline campaigns around issues like ending police brutality, advocating for digital rights, and challenging internet shutdowns in countries like Nigeria, Sudan, and Zambia. The document provides an overview of Waihiga's background and campaigns and outlines some of the key issues, actors, and trends related to internet governance and digital rights in Africa.
From the full report 2018 of Freedom House. Governments around the world are tightening control over citizens’ data and using claims of “fake news” to suppress dissent, eroding trust in the internet as well as the foundations of democracy.
IT BELONGS TO YOU: PUBLIC INFORMATION IN THE MIDDLE EAST AND NORTH AFRICA Dr Lendy Spires
Access to information remains limited across the Middle East and North Africa region. While Egypt, Morocco, Palestine and Yemen have committed to the right of access to information in international law, only Yemen has passed a national access to information law, though it has not been implemented. Morocco recognizes the right in its constitution. Transparency International's research found existing laws in the four countries do not meet international standards and prevent identifying corruption. Governments are working to pass new laws but have not adequately incorporated civil society input. Strong, effectively implemented access to information laws are needed across the region to promote transparency and fight corruption.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Poverty as a factor in human trafficking in rwandaJohnGacinya
Poverty is a world wide phenomenon and is believed to be the main cause of human trafficking and Rwanda is no exception. Households below the poverty line are prone to human trafficking. The aim of this study is to investigate the relationship between poverty and human trafficking. Quantitative approach was adopted. The target population of the study was 200 and the sample size is133 respondents.
Human trafficking prevalence_in_rwanda_the_role_plJohnGacinya
Unemployment is the most single factor that facilitates human trafficking in the developing countries such as Rwanda. Rapid population growth constrains wealth creation and so people always migrate to countries of opportunity to escape lack of employment. The aim of this study is to investigate the role of unemployment in determining human trafficking. Quantitative and qualitative approaches were adopted.
Gender inequality is built on the premise that women have been marginalized in all aspects of life and this has resulted in poverty which is a function of human trafficking. The purpose of this study is to investigate the contribution of gender inequality to human trafficking in Rwanda. Quantitative and qualitative approaches were adopted. The target population of the study comprised of 341 respondents and the sample size was 184 respondents. Among those who were issued a questionnaire only 154 responded. Stratified sampling technique and simple random sampling were used to obtain a representative sample.
Assessing the impact_of_globalization_on_human_traJohnGacinya
Ever since contemporary globalization came on the world scene around 1990s, free movement of goods, services and ideas grew as a result of reduced barriers to international movement trade and investment. The economic flow of goods and services has gone along with movement of people across the globe. The voluntary and involuntary movement of people occurs around world and is associated with opportunities that exist out there. Communication and flow of information is in real time in the current period from one corner of the globe to the other is occurring at high speed. Beliefs, ideas and culture have been relayed fast through the Internet, Smart Phones and other Communication devices.
Analyzing the influence of information and communication technology on the sc...JohnGacinya
Rwanda‟s Information Communication and Technology (ICT) sector is among the fastest growing ICT sectors in Africa. Mobile phone penetration had risen to 65% and internet spread was above 20% in 2013. ICT is double edged and has had positive and negative effects to the Rwandan society. It is hoped that Information communication technology is likely to reduce unemployment and transform the country into a competitive, knowledge based economy.
Poverty as a_factor_in_human_trafficking_in_rwandaJohnGacinya
The aim of this study is to investigate the relationship between poverty and human trafficking. Orphans and single mothers are the ones who fall below the poverty line. To overcome poverty export diversification and expanding manufacturing sector is of paramount importance.
There are four major types of global interaction and these include:
a) Communication, or the movement of information, including
the transmission of beliefs, ideas, and doctrines
b) Transportation, the movement of physical objects, including
war material and personal property as well as merchandise
c) Finance, the movement of money and instruments of credit
d) Travel and movement of persons. This includes voluntary
movement which is travel and migration as well as involuntary
movement which is human trafficking and forced migration
Human trafficking prevalence_in_rwanda_the_role_pl (1)JohnGacinya
The aim of this study is to investigate the role of unemployment in determining human trafficking. Quantitative and qualitative approaches were adopted. The study concludes that Human trafficking in Rwanda is prevalent in form of labor and sexual exploitation. To overcome unemployment and therefore human trafficking the government of Rwanda needs to create more jobs.
Human trafficking prevalence_in_rwanda_the_role_plJohnGacinya
The aim of this study is to investigate the role of unemployment in determining human trafficking. Quantitative and qualitative approaches were adopted. The study concludes that Human trafficking in Rwanda is prevalent in form of labor and sexual exploitation. To overcome unemployment and therefore human trafficking the government of Rwanda needs to create more jobs.
Sangyun Lee, 'Why Korea's Merger Control Occasionally Fails: A Public Choice ...Sangyun Lee
Presentation slides for a session held on June 4, 2024, at Kyoto University. This presentation is based on the presenter’s recent paper, coauthored with Hwang Lee, Professor, Korea University, with the same title, published in the Journal of Business Administration & Law, Volume 34, No. 2 (April 2024). The paper, written in Korean, is available at <https://shorturl.at/GCWcI>.
What are the common challenges faced by women lawyers working in the legal pr...lawyersonia
The legal profession, which has historically been male-dominated, has experienced a significant increase in the number of women entering the field over the past few decades. Despite this progress, women lawyers continue to encounter various challenges as they strive for top positions.
Matthew Professional CV experienced Government LiaisonMattGardner52
As an experienced Government Liaison, I have demonstrated expertise in Corporate Governance. My skill set includes senior-level management in Contract Management, Legal Support, and Diplomatic Relations. I have also gained proficiency as a Corporate Liaison, utilizing my strong background in accounting, finance, and legal, with a Bachelor's degree (B.A.) from California State University. My Administrative Skills further strengthen my ability to contribute to the growth and success of any organization.
This document briefly explains the June compliance calendar 2024 with income tax returns, PF, ESI, and important due dates, forms to be filled out, periods, and who should file them?.
Genocide in International Criminal Law.pptxMasoudZamani13
Excited to share insights from my recent presentation on genocide! 💡 In light of ongoing debates, it's crucial to delve into the nuances of this grave crime.
Lifting the Corporate Veil. Power Point Presentationseri bangash
"Lifting the Corporate Veil" is a legal concept that refers to the judicial act of disregarding the separate legal personality of a corporation or limited liability company (LLC). Normally, a corporation is considered a legal entity separate from its shareholders or members, meaning that the personal assets of shareholders or members are protected from the liabilities of the corporation. However, there are certain situations where courts may decide to "pierce" or "lift" the corporate veil, holding shareholders or members personally liable for the debts or actions of the corporation.
Here are some common scenarios in which courts might lift the corporate veil:
Fraud or Illegality: If shareholders or members use the corporate structure to perpetrate fraud, evade legal obligations, or engage in illegal activities, courts may disregard the corporate entity and hold those individuals personally liable.
Undercapitalization: If a corporation is formed with insufficient capital to conduct its intended business and meet its foreseeable liabilities, and this lack of capitalization results in harm to creditors or other parties, courts may lift the corporate veil to hold shareholders or members liable.
Failure to Observe Corporate Formalities: Corporations and LLCs are required to observe certain formalities, such as holding regular meetings, maintaining separate financial records, and avoiding commingling of personal and corporate assets. If these formalities are not observed and the corporate structure is used as a mere façade, courts may disregard the corporate entity.
Alter Ego: If there is such a unity of interest and ownership between the corporation and its shareholders or members that the separate personalities of the corporation and the individuals no longer exist, courts may treat the corporation as the alter ego of its owners and hold them personally liable.
Group Enterprises: In some cases, where multiple corporations are closely related or form part of a single economic unit, courts may pierce the corporate veil to achieve equity, particularly if one corporation's actions harm creditors or other stakeholders and the corporate structure is being used to shield culpable parties from liability.
Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordinary And Special Businesses And Ordinary And Special Resolutions with Companies (Postal Ballot) Regulations, 2018
2. Gacinya John/ Analyzing the influence of Information and communication Technology on the scourge of human
trafficking in Rwanda
1096 Academy of Social Science Journal, , vol. 03 Issue 01, January, 2018
speed their operations with least difficulty as internet is
borderless, (Rodas, 2014).
Globalization has facilitated the expansion of information and
communication technology and information is more available
and this has helped to transform peoples‟ life, especially for
those doing legal businesses, (UNGIFT, 2008).In the current
period the number of internet users has risen to 1.8 billion
worldwide and this is growth on internet by 400%, (Rachel,
2011). Financial proceeds from Internet pornography industry
alone generated 2.8 billion USD in 2006.
Information communication technology accesses information
to people by the use of a computer and internet application
services such as ;web sites, Search engines, Pornographic
spams, chat rooms, file transfer protocol, File swapping
programs and peer to peer networks. It is with these internet
application services that human trafficking can be carried out,
(Chawki &Wahab, 2004).
Different methods are used to commit the crime of human
trafficking. The offender and the victim can meet on the
facebook and express love and admiration to each other.
Location can be set for the meeting and then an air ticket sent
to the victim. The other method applied by traffickers to trap
the victim is to advertise that an employment waits for these in
need of the job, and then the unsuspecting victim accepts job
offers and travels to locations suggested by traffickers. The
end of it all is that the trafficker begins to deny any kind of
communication to the victim, (Herbert, 2013).Sex trafficking
in most cases occurs where facebook friends (predator and
victim) get used to one another until confidence builds,
(Oduor, 2017).
Combat Human trafficking crime has had challenges as
information communication technology does not respect
national borders as is the case with the law enforcement
agencies. Traffickers take advantage of communication
infrastructure provided by the governments to recruit victims
of human trafficking, yet many governments do not have the
means to detect and prevent trafficking of human beings by
use of Information communication technology, (Linda &
Baker, 2013).
Human trafficking crime combat has had another challenge of
lack of cooperation among anti-trafficking organizations lack.
Organizations compete rather than complement each other in
the exercise of human trafficking combat.Anti trafficking
organizations have competing values, missions, and funding.
Organizations are reluctant to share information and there is
often mistrust, privacy, public safety and gaps in terms of
technology, (Latonero, 2011).
Information communication technology has been used for
sexual and labor exploitation. US based corporations have
obtained cheap labor for exploitation from India and the
Philippines. Western Europe and North America have had
regular supply of sex workers from the developing world by
use of information communication
technology.Generally,worldwide expansion and use of
internet has speeded up sexual exploitation greatly, (Rahman,
2011).
Rare opportunities to human trafficking combat rests with
organizations such as; the Interpol, the G8 Sub-group on
High-Tech Crime, the Virtual Global Taskforce, Internet
Watch Foundation (IWF) and The Virtual Global Taskforce
(VGT).The afore mentioned organizations collaborate with the
international law enforcement agencies to use technology and
share intelligence, information and resources in the fight
against human trafficking. Virtual Global Task force
collaborates with law enforcement agencies to protect children
from exploitation. They identify location, and help children at
risk. Virtual Global Technology creates websites with images
of child abuse and this is done to attract traffickers to the
website. It is with these websites law enforcement officials
monitor to establish wrong elements wanting to abuse
children, (Rachel, 2011).
There is also the G8 Sub-group on High-Tech Crime which
comprise of; Canada, France, Germany, Italy, Japan, Russia,
the United States, and the United Kingdom. The group of
eight countries established the G8 “Sub-group” on High
Technology to Prevent, investigate, and prosecute cybercrimes
that involved computers, (Rachel, 2011).
There is also the Council of Europe‟s Convention on
Cybercrime which provides procedures and investigative tools
for law enforcement worldwide in order to prevent and combat
all types of internet crime, including trafficking in
persons,(Linda & Baker, 2013).
Private technology giants have also joined the fight against
human trafficking. Google, Palantir Technologies, Microsoft
Digital Crimes Unit, Microsoft Research, LexisNexis and
NGO Thorn have joined the fight against human trafficking
and do provide funds and technical knowhow in identifying
human traffickers,( Herbert ,2013).
Information communication technology has been used to
detect and apprehend traffickers by developing platforms that
can capture calls from the trafficking reporting hotlines of
various organizations and distributes those phone calls via text
or email among those organizations, (Latonero, 2011).
Further, human trafficking can be prevented by use of Short
Message Service (SMS) technologies to inform the public of
the possibility of human traffickers presence and their plans to
manipulate and recruit people. More so, mobile devices and
SMS technologies have enabled victims of human trafficking
to contact service providers for support. Again, Social media
platforms have also been used to raise awareness of human
trafficking globally, (The US state department, 2013).
In a similar manner, law enforcement officials have been able
to identify victims by use of facial recognition software and do
locate minors who are being exploited on line. Law
enforcement officials are also able to trace text messages from
phones and computers. The same applies to voice mails and
3. Gacinya John/ Analyzing the influence of Information and communication Technology on the scourge of human
trafficking in Rwanda
1097 Academy of Social Science Journal, , vol. 03 Issue 01, January, 2018
web browsing history to produce evidence for prosecution
purposes, (US state department, 2013).
Cybercrime is on the rise on the continent of Africa.
Computers and servers are not protected and crimes such as
human trafficking and financial fraud do take place. Fighting
human trafficking by use of technology requires a coordinated
effort. In East Africa a task force from different stakeholders
that include the governments, industry and civil society has
been formed in order to fight human trafficking and other
crimes that emanate from use of a computer. This implies that
legal, policy and regulation matters will be harmonized
(Quartie & Odoom, 2012).
Rwanda is vulnerable to human trafficking as conditions that
breed human trafficking are conducive. In the first case
Rwanda is a Country with the fastest broadband Internet speed
in Africa. There are about mobile money subscribers were 2.5
million in 2013, Mobile phone penetration is rapidly
increasing and is now estimated at 65%. Internet Penetration is
currently at 20% and it is envisaged to reach 95% in the next
five years, (Rwanda National youth policy, 2015). More than
50 per cent of the adult Rwandan population own and use
mobile phones for communication. Electronic media are
available and the public is encouraged to use ICT as a modern
technique to exercise their right of access to information.
Cyber cafés and Tele-centres are also available in different
districts of the country while an ICT bus travels to some
remote rural areas, which are not yet connected to internet, to
allow them to have access to modern tools of information and
communication, (Rwanda Human rights council 2010).
Coupled with the availability of Information communication
technology, the Rwandan population that has youths who are
unemployed and underemployed. There are about 7000
children living and working on the streets of Rwanda. Most
street children are boys and many have never been to school.
About 352,550 children aged between 5-17 years of age were
active in the labor force and over 83% were engaged in
agriculture alone and over 11% in domestic work by
2002.About 21 % of the Rwandan children have lost one or
both parents due to conflict past and HIV/AIDS pandemic.In
2010 about 101,000 children were house hold heads of 42 000
families, This leaves the youth potentially vulnerable to
human trafficking, (Rwanda strategic plan for child‟s rights,
2011).
There is also evidence of internal and cross-border trafficking
of girls and women, as well as cross-border movement of
children for commercial sexual exploitation. Human
trafficking in all its forms (Internal and international) is
present. Police statistics reveal 153 cases of human trafficking
registered between 2009 and 2013, with the majority of the
victims being young females below the age of 35.The number
of cases could be higher than the afore mentioned number but
the covert nature of human trafficking undermines
quantification,( Rwanda National youth policy 2015).
2. Problem statement
While the rapid use of digital technologies worldwide like
mobile phones, social networking sites and the Internet has
provided significant benefits to society, more new channels
and potential opportunities for exploitation have also
emerged. Increasingly, the business of trafficking in persons is
taking place online and over mobile phones. The positive side
is that the same technologies that are being used for trafficking
in persons can become a powerful tool to combat the same
threat. The key role that digital technologies play in human
trafficking still remains unclear, however, a closer
examination of the phenomenon is vital to identify and
respond to new threats and opportunities. Rwanda has the
fastest growing information communication technology sector
in Africa. About 50% of the adult population in Rwanda own
mobile telephones. Mobile phone penetration is thought to
have reached 65% in the current period and internet
penetration is at 20%. Electronic media are available in
Rwanda and the public is encouraged to use ICT as a modern
technique to exercise their right of access to information.
Rwandan government has campaigned against human
trafficking through public awareness, regional cooperation,
law enforcement, improved border security and legislation, but
cases of human trafficking seem to keep rising as more than
153 cases have been recorded since 2009 which number could
even be greater as of today. Use of ICT has become a major
platform on which trafficking in persons is practiced in
Rwanda. But the same technology can be used to combat the
menace .This is so urgent that president Paul Kagame calls for
regional cooperation in terms of sharing information and using
latest technologies in combating human trafficking( Rwanda
National police magazine 2016).From this background ,there
is every need for a study to be conducted on how ICT
enhances human trafficking and how it can be used to prevent
and combat the very threat in Rwanda.
3. Research Objective
The main objective of this study is to analyze the role of
Information Communication technology in facilitating human
trafficking in Rwanda. Specifically,
(1) To analyze the influence of technology in facilitating
human trafficking in Rwanda.
(2) To analyze the extent to which Rwanda has been able to
combat human trafficking using technology.
4. Literature review
Asiimwe, (2014) notes that Rwanda is a developing country
and lacks economic opportunities and as such people have to
look for these opportunities elsewhere. One of the means and
ways used is the internet and social media .The Internet and
social media, thus influence the unsuspecting people to go out
and rush for the supposed opportunities and in the process are
trafficked. In this sense the researcher concurs with the author,
access to social media and the internet have penetrated
Rwanda and this provides the platform for traffickers to
exploit victims easily.
4. Gacinya John/ Analyzing the influence of Information and communication Technology on the scourge of human
trafficking in Rwanda
1098 Academy of Social Science Journal, , vol. 03 Issue 01, January, 2018
Leva Pundina (2013) shares the view that information
communication technology has brought benefits and has
weaknesses in the current period. Law enforcement officials
are able to track human traffickers‟ cell phones and do
understand their criminal activities more and better. However,
information communication technology has also facilitated
criminals to create online platforms to recruit vulnerable
people they identify as targets. One difficulty obtaining is that
electronic information available is often fragmented and is
subject to privacy rules. In the case of Rwanda, Cyber-crime
detection is already in place to track human trafficking
suspects. However; Cyber-crime detection has not covered the
whole country.
United Nations global initiative to fight trafficking (2008)
Indicates that traffickers have used Information
communication technology to communicate with potential
victims via the internet and websites during recruitment
processes. Likewise information communication technology is
used to transfer funds obtained from human trafficking from
one country to the other by use of ICT in a way that looks
lawful. Other than recruitment of victims and transfer of
funds, ICT bears pornographic websites advertising women
for sexual exploitation. These women are forced to perform
live sex for sale and may not know that they appear on the
websites. In Rwanda criminals communicate with victims by
use of ICT.However, there has not been any evidence of live
pornographic material produced and distributed for sale.
Elliott & McCartan (2013) assert that there is a growing
concern that sex trafficking is facilitated by the internet and
online sex trafficking respects no national borders.I CT by use
of internet has given opportunities for human traffickers to
advertise victims they hold. Online networking sites such as
Craigslist, MySpace and Facebook are being used for
trafficking. In the case of Rwanda, traces of Facebook and
whatsapp have been found to transmit sex trafficking affairs.
Channing (2017) indicates that human traffickers have in
recent times improved their mode of operations. They have
expanded their recruitment, transportation, control and
exploitation of victims perfectly as a result of use of internet,
social media and have used deceptive online advertisements to
recruit individuals for both sex and labor trafficking. In line
with the author, Rwanda faces a similar situation of online
recruitment supported by rapid spread of the internet in the
country.
Chibba (2013) underscores the importance of protecting
women and children who are exploited via internet sex
trafficking. Internet sex trafficking involves human traffickers
who lure young girls and women into internet dens and forced
to have sex with men while operating computers and cameras.
In Philippines, women and girls come into the den after job
opportunities are promised. They are forced to have sex and
pictures produced are for sale. Rwanda organic law N°
01/2012/OL of 02/05/2012 strongly prohibits criminals who
distribute any pornographic material and currently no cases of
pornographic pictures produced for sale to the public.
Latonero (2011) states that ICT is the greatest facilitator of
commercial sex trade in all countries. In the case of the United
States of America Google search has identified more than
5000 websites that facilitate sex trafficking and sex tourism. In
the case of labor trafficking, victims are mostly recruited the
developing world and this mostly done by word of mouth. The
same case for Rwanda, ICT has become a meeting point for
traffickers and victims to carryout transactions for sex and
labor trafficking.
Kunze (2010) observes that there are no limitations to the
operations of human traffickers because no international law
that exists to prohibit trafficking via ICT.All countries have
domestic law which is restricted to the borders. Traffickers
can carry on human trafficking operations without crossing the
borders because of ICT.This is again because information
communication technology makes it possible for traffickers to
recruit, advertise and even sell victims as they share
information by means of information communication
technology. Borders have no limitations to the flow of
information required by criminals. They are able to commit
cases of human trafficking away from their location. Besides,
traffickers can use information communication to arrange for
sex tours. ICT applications such as chat rooms, message
boards, peer to peer file sharing servers, news groups, and
websites are used by criminals to obtain information about
sexual tourism destinations. In Rwanda, human traffickers use
mobile phones and social media to make contacts to the
victims. Laws are also restricted to the borders. However;
interstate cooperation which exists among East African
member countries has helped to mitigate trans boundary cases.
According to Kate (2004), finds that Europe is mostly the final
destination of many trafficked women for sexual purposes
around the world. Most of the trafficked women are mostly
used in brothels, bars, nightclubs, cafés, the streets and
massage parlours, saunas, escort agencies, hotels and even
private homes. In the Netherlands, pimps use Internet to
contact young women for sexual exploitation. In the Rwanda
situation ICT facilitates sex trafficking among the girls and
destinations are mostly regional countries.
Mendel & Sharapov (2014) are of the view that the Internet
and online networks have facilitated human trafficking in the
recent years. Internet has enabled traffickers to operate with
increased ease and efficiency. Social networking, online
classifieds and dating websites are used to recruit and
advertise sex trafficking and labor. The researcher concurs
with the author, however no websites that advertise labor and
sex trafficking.
Kabance (2014) advances that International trafficking
networks have thrived due to technological advancements in
the age of globalization. Media has been instrumental in the
rapid spread of information transnationally. Trafficking
networks have also used cell phones and the Internet to carry
on international operations to recruit and transport human
beings for sexual exploitation. However, Kabance,(2014) also
argues that ICT is capable of fighting against human
5. Gacinya John/ Analyzing the influence of Information and communication Technology on the scourge of human
trafficking in Rwanda
1099 Academy of Social Science Journal, , vol. 03 Issue 01, January, 2018
trafficking. Governments, organizations and law enforcement
use ICT to detect, track, and shut down criminals operations.
Help hotlines have been used to assist victims in rescue
operations. This kind of situation applies to Rwanda where
specific mobile phone numbers are widely distributed in all
police stations being coordinated by “Isange one stop center”.
Latonero, (2012) finds that anti-Trafficking digital
communication technology is being used in the fight against
human trafficking and the public is concerned and taking part
in online anti-trafficking interventions. The public
involvement in making online petitions against human
trafficking. Crowd sourcing, Facebook and twitter have
informed the public of the presence of traffickers. As an
example, Digital activists against human trafficking like
change.org which petitioned craigslist to shut down the
websites known as „adult services‟ in 2010. Latonero, (2012)
also states that Facebook and twitter are used to fight human
trafficking. NGOS that fight human trafficking have used
Facebook to reach a very large audience. For example an
NGO, ECPAT UK has more than 29,000 members and with
Facebook facility they inform the public more about human
trafficking. Twitter serves as a hub for human trafficking
activism. With Twitter individuals and organizations share
information about human trafficking, raises the awareness,
mobilizes support and puts pressure on individuals and
organizations fight against human trafficking.
Quarshie, (2014) argues that ICT technology has been used to
commit human trafficking crimes such as child pornography.
Africa needs to take advantage of modern technology by use
of CCTV technology, tracking technology, social media and
mobile phone to combat human trafficking.Quarshie
commends that African leaders need to embrace the use of
technology to meet future demands in investigations and
prosecution. In the case of Rwanda, distributing mobile
phones to the civilian population by the national Police of
Rwanda is meant to provide information regarding human
trafficking that can be used in investigation and prosecution of
human trafficking cases.
Longe et al, (2009) point out that information communication
technology has widely spread in Africa and has at the same
time influenced human trafficking in the process. Child
trafficking, prostitution and pornography are on the
rise.Webiste sexual content has remained of interest to the
youth and scholars have found out there is a positive
relationship between website sexual content such as
pornography and sexual beliefs, attitudes and behavior in
Nigeria.Longel et al (2009), continuous to state that Nigeria
has used web filtering programs to remove sex related material
from the internet. Child Trafficking prevails in Africa and
children are trafficked to the western world and have ended up
on the streets, brothels and massage parlors. Internet and
mobile phones have also facilitated prostitution in the sub
Saharan Africa .Tourists who seek travel locations are
misdirected into webs that advertise sex tours offering travel
incentives such as pornography and escorts mail order brides.
The majority of the Rwandan Youth have access to webs that
advertise sex related issues and these drive them to develop
behavior towards sex.Such kind of sex behavior have led to
sex trafficking in Rwanda. Cyber-crime center take care by
tracking for criminals involved in human trafficking.
5. Methodology and Material
In this study documentary research was applied. Documentary
research method refers to the analysis of documents that
contain data about the phenomenon under study. Previous
studies were used to collect data and there was much reliance
on description and interpretation of data rather than collecting
raw data in accordance with Glenn, (2009). The documentary
research method was used in investigating and categorizing
physical sources, most commonly written and non-written
documents, whether in the private or public domain as stated
by Harelimana, (2015). The data inclusion criteria depended
on; authenticity, credibility, representativeness and meaning
attached to evidence, (Ahmed, 2010).Most of the obtained
data was from; books, brochures and minutes of meetings,
electronic journals, press releases, diaries, background papers,
event programs, letters and memoranda, newspaper articles,
press release, program proposals, radio and television
program, institutional reports and public records.
6. Results and Discussion
According to position paper for the Economic and Social
Council, (2014) Rwanda is a developing country and
vulnerable to human trafficking owing to her location in a
conflict zone and the political past. Rwanda hopes to eliminate
transnational organized crimes that include human trafficking
by use of technology. Rwanda has vulnerable people of
different categories; thus there are refugees from other
countries such as DR Congo, Burundi and returnees from
Tanzania. Over 95,000 refugees came from Burundi and there
are about six refugee camps of refugees from DR Congo.
These are vulnerable people enough to be trafficked. The rapid
increase in the use of ICT has hasted human trafficking as the
number of vulnerable refugees keeps rising.
The Council working Group on children online protection in
Rwanda, (2016) indicates that, since 2000, the Government of
Rwanda implemented National Information Communication
Infrastructure (NICI) programs that helped to distribute more
computers to young students. The increase of the mobile
devices and smart devices also triggered the use of ICT in the
country. Equally, the tele-centers that have been constructed in
the country played a big role in Internet usage. These
technologies and ICT penetration have introduced new types
of threats such as online sex trafficking. The internet and
mobile phones have spread to low segments of the Rwandan
community that includes the poor and the young.
Opportunities of exploiting the youth for traffickers exist in an
environment of vulnerability, access to information and good
communication. Online transactions include advertising and
recruiting .This has made it so difficult for the security system
to combat human trafficking.
6. Gacinya John/ Analyzing the influence of Information and communication Technology on the scourge of human
trafficking in Rwanda
1100 Academy of Social Science Journal, , vol. 03 Issue 01, January, 2018
In 2014 the parliament and other high institutions in Rwanda
found out that girls were the ones involved in human
trafficking online. Cases are there where young girls are
enticed to go outside the country to seek opportunities that
exist there and this is mostly done by use of mobile phones. It
is unfortunate the young girls accept traffickers blindly due to
ignorance about sex traffickers, (New times reporter, 2015).
Such cases have increased steadily as they are facilitated by
quick access to internet and possession of more mobile phones
than they had in 2014.This meets an increased number of
unemployed girl population who are desperate for jobs to meet
their life desires.
To protect the child online, Rwanda ICT regulator, (RURA)
took the initiative to ensure that all subscribers of mobile
cellular services are registered in the Republic of Rwanda.
This exercise was intended to address several issues, related to
security and social problems. Rwanda ICT regulator further
developed guidelines governing the Operations of Internet
cafés in Rwanda that protect children from harmful Internet
content. It sounds like some online services are not protected
fully to counteract some online transactions between
traffickers and potential victims. This has contributed to a
steady increase in human trafficking cases facilitated by ICT
despite government efforts to combat the vice.
The Government of Rwanda has enacted the Organic Law N°
01/2012/OL of 02/05/2012 instituting the penal code that
penalizes any person, who displays, sells, rents, disseminates
or distributes pornographic pictures, objects, movies, photos,
slides and other pornographic materials involving children.
Having such strong legislation yet human trafficking cases are
consistently on a rise indicates that there is a big gap between
strong laws and effective implementation as of today.
According to the Rwanda prosecutor general (2017), Human
trafficking is a new crime, and is occurring in Rwanda. The
Rwanda prosecution department handled 10 cases in
2012/2013, 51cases in 2013/2014, 41 cases in 2014/2015 and
32 cases in 2015/2016 of human trafficking where 10 cases of
human trafficking had no supporting evidence. Victims of
human trafficking are recruited through social media.
Rwanda National Police (2015) observes that Interpol
communication system I-24/7 has been used to track and
rescue trafficked individuals. This has been done through
information exchange. Interpol communication system in
Kigali was able to rescue two Rwandans including a girl
student who had been trafficked to Zambia. A Ugandan girl
was also intercepted at Kigali international airport as she was
being trafficked to Asia. All the afore mentioned operations
were enabled by use of I-24/7 technology. Law enforce
officers are now able to track mobile phone print outs to locate
trafficked girls through Interpol operations. As an example a
Rwandan girl from Kimisagara suburb of Kigali city was
rescued from Kampala where she had been trafficked. It came
to be understood that the trafficked girl had been enticed to go
with a friend to Kampala who promised her to obtain a job in a
supermarket. The trafficked girl was rescued after her
telephone and the telephone of the trafficker were tracked by
Interpol, (Kwizera, 2015).
This suggests that if well utilized by increasing cybercrime
centers that track phone messages of suspects of human
trafficking, ICT can be a strong tool in combating human
trafficking in Rwanda. This will meet the recent development
in Rwanda National police is the installation of the cybercrime
facility to detect crimes that use information communication
technology. This will enable Rwanda national police to
combat internet and mobile phone based crimes, (Rwanda
National Police magazine, 2016).In addition to this remedy,
there is a need to increase data protection so as to deny
traffickers quick access to ICT services.
Sandys, (2005) hints that United Nations entities have worked
to ensure access to and use of ICT by rural women in many
different countries, Rwanda inclusive. The UNDP/Japan
Women in Development Fund has supported programs in
Rwanda to increase rural women‟s access to ICT, but internet
has speeded the exploitation of women and girls by spreading
sexual manners in real time. In a similar move Rwanda
National police has provided mobile phones to the rural people
in order to contact the police in case of security bleach
including human trafficking, Rwanda National police
Magazine, (2014). This has empowered the women
development in the country however, not giving prior training
to the users has facilitated a rapid misuse of the would be
opportunity (ICT). This lack of sufficient knowledge in ICT
usage has provided a platform to traffickers.
Conclusion
Information communication technology is on the increase in
Rwanda. Internet is available in most government institutions
and has even penetrated into the rural areas and access to
information in real time is possible. Mobile phone penetration
is significantly so high, where 50 % of the population of
Rwanda own mobile phones. Electronic media is available and
the public is encouraged to use information communication
technology and this has proved to provide a platform for
traffickers to exploit the potential victims who are already
vulnerable due to other circumstances including
unemployment, influx of refugees and poverty. Law
enforcement officials are handicapped in the face of
information and communication technology that operates un
detected.
On the other hand there is evidence that human trafficking has
been stamped out by use of technology. In Rwanda, traffickers
are tracked until they are apprehended. Cyber technology is
being used to track human traffickers and the I-24/7 Interpol
communication is used to share information on suspected
human traffickers and rescuing the victims through the
information exchange mechanism. This has played a key role
in combating human trafficking in Rwanda.
It is imperative to note that there has been a remarkable
progress in combating human trafficking in Rwanda using ICT
7. Gacinya John/ Analyzing the influence of Information and communication Technology on the scourge of human
trafficking in Rwanda
1101 Academy of Social Science Journal, , vol. 03 Issue 01, January, 2018
although there is still a gap between good policies in place and
their implementation.
Recommendations
The Rwandan population should endeavor to cooperate with
the government bodies most especially the National police by
providing information in time concerning human trafficking
due to ICT and any suspects in their communities.
Increasing awareness on the proper usage of information and
communication technologies especially the social media can
of a great help in the prevention of human trafficking. This
can be done through community policing and mass
communication to empower a good number of Rwandans
about the role of ICT in human trafficking.
There should be an enhanced multi-disciplinary approach
where the ministry of ICT, National police of Rwanda,
bilateral organizations and Telecommunication companies can
work together to prevent and combat human trafficking in
Rwanda caused by ICT.
Regional and international cooperation related to the combat
of human trafficking related to ICT should be strengthened
and international law to address human trafficking must also
apply on the use of information and communication
technology that facilitates human trafficking crimes. Therefore
harmonization of ICT activities and shading off matters of
privacy, mistrust and reduction of gaps amongst states will
enhance human trafficking combat operations.
References
Ahmed, J.U. (2010).Documentary research Methods: New
Dimensions. Indus Journal of Management & Social Sciences,
4(1), 2010, p.3. http://www.academia.edu/4900830/
Documentary_Research_Method_New_Dimensions
Asiimwe, F. (2014). Factors pre- disposing women and girls to
human trafficking in Rwanda: A baseline survey and needs
assessment report, Kigali, Pp.19-36 www.faasirw.org/.../
BASELINE%20%20SURVEY%20AND%20NEEDS%2...
Bishumba,N.(2017, Sept 12). GBV: Prosecutor calls for
tougher punishment.The Newtimes,p.1, http://www.newtimes.
co.rw/ section/read/208169
Channing,M. (2017). Transnational Crime and the Developing
World.USA,(Washington DC): Global financial
integrity,P.12.www.gfintegrity.org/wp-content/uploads/
2017/03/Transnational_Crime-final.pdf
Chibba, M. (2013). Human Trafficking and Migration:
Concepts, Linkages and New Frontiers. Global Policy,
Economics Research (UNU-WIDER):Helsinki,p.6
.www.globalpolicyjournal.com/.../Chibba%20-
%20Human%20Trafficking%20and%2.
Denge, B. (2017 Jun 16). Use digital technology to fight cross-
border trafficking in South Asia.Hindustantimes, India: New
Delhi. http://www.hindustantimes.com/opinion/use-digital-
technology-to-fight-cross-border-trafficking-in-south-
asia/story2gQmiYmtgty1xNiYooy7vI.html
Donovan, M. (2017). Technology in the fight against
trafficking: Tracking criminals and helping victims.
Washington DC: National Consumers League, P.1,
http://www.nclnet.org/trafficking_tech
European Commission. (2016). Report on the progress made
in the fight against trafficking in human beings. European
Union: Brussels, p.9. https://ec.europa.eu/...human-
trafficking/trafficking...human.../commission_report_on.
Elliott, J. & McCartan, K. (2013). The reality of trafficked
peoples access to technology. Journal of Criminal Law, 77
(3). Bristol: University of Western England pp. 255-273.ISSN
0022-0183 Available from: http://eprints.uwe.ac.uk/20992
Glenn, B.(2009). Document analysis as a qualitative research
method. Qualitative research journal , vol. 9, no. 2, 2009.
USA: Western Carolina University, p.2
http://www.academia.edu/8434566/document_analysis_as_a_
qualitative_research_method
Herbert, B.D. (2013). Human Trafficking and the
Internet.Judges’Journal-American Bar Association, Vol. 52
No. 1, USA: Washington D.C, https://www.americanbar.org/
publications/judges_journal/2013/winter/human_trafficking_a
nd_internet_and_other_technologies_too.html
Isiaka,A.A.et al.(2015). The Growth and Impact of
Information and Communication Technologies in Africa.
International Journal of Electronics and Electrical
Engineering. 3(1), 2015, Akule: School of Engineering and
Engineering Technology, p.1. www.ijeee.net/uploadfile/
2014/0324/20140324021146366.pdf
Kabance, K. (2014). The Globalization of Sex Trafficking.
P.8-
36.https://ucollege.wustl.edu/files/ucollege/imce/iap.kabance.d
rp_.pdfz
Kate,C. (2015). Combat Trafficking in Human Beings:
Literature Review and Industry Context.University of west
London, Pp.10-18. https://www.brookes.ac.uk/Documents/
Microsites/Combat-THB-Literature-Review
Kunze,I.E.(2010). Sex trafficking via the internet: How
international agreements address the problem and fail to go far
enough. Journal of high technology law.Vol.10 (2). Suffolk
University,https://www.suffolk.edu/documents/jhtl_publicatio
ns/kunze.pdf
Kwizera, E. (2015, September 13). Girls trafficked from
Rwanda, sexually abused in Uganda.Imirasire, p.3,
http://eng.imirasire.com/news/all-around/in-rwanda/article/
girls-trafficked-from-rwanda
Latonero, M.et al,. (2011). Human Trafficking Online: The
Role of Social Networking Sites and Online Classifieds.
Annenberg (University of South California): School of
Communication Leadership and Policy.Pp, 8-31.
8. Gacinya John/ Analyzing the influence of Information and communication Technology on the scourge of human
trafficking in Rwanda
1102 Academy of Social Science Journal, , vol. 03 Issue 01, January, 2018
https://technologyandtrafficking.usc.edu/files/2011/09/Human
Trafficking_FINAL.pd
Latonero, M.(2012).Technology & Human trafficking: Digital
Activism in Anti-Trafficking Efforts.Los Angeles: Center on
Communication, leadership and policy,Pp.1-3.
https://technologyandtrafficking.usc.edu/digital-activism-in-
anti-trafficking-efforts/
Leva Pundina.(2013). Technology and Human Trafficking:
Friends or Foes? USA: McCain Institute for International
Leadership.http://wiisglobal.org/2013/07/16/technology-and-
human-trafficking-friends-or-foes/
Linda Baker & Marcie Campbell, (2013). Information
Communication Technologies and Trafficking in Persons.
Learning Network, Centre for Research and Education on
Violence against Women and Children page.
Longe, O.et al. Criminal Uses of Information &
Communication Technologies in Sub-Saharan Africa: Trends,
Concerns and Perspectives. Journal of Information
Technology Impact .9(3), 2009, Lousiana: Southern University
and A&M College,Pp.155-172.www.jiti.com/v09/jiti.v9n3
.155-172.pdf
Mendel, J. & Sharapov, K.(2014). Human trafficking & online
networks: Policy Briefing. Budapest: Centre for Policy
Studies, Central European University, Pp.3-13.
pasos.org/.../cps-policy-brief-upkat-human-trafficking-and-
online-networks-2014.pdf
New times reporter,(2015 Jan 21).The ordeal of human
trafficking victim.The new times,p.1,
http://www.newtimes.co.rw/section/read/185155/
Oduor, C. (2017, September 6). Alarm in Kisumu as women
fall victims to Facebook criminals. Standard Media, P.2, Read
more at:
https://www.standardmedia.co.ke/business/article/2001253708
/facebook-date-rape-hits-rocky-village-hill
Quarshie,H.O.(2014). Using ICT to Fight Crime - A Case of
Africa. Journal of Emerging Trends in Computing and
Information Sciences. Accra: University College of science &
technology, Pp.1-4. https://www.researchgate.net/.../
publication/...Journal...Information...ICT...Africa/.../J...
Quarshie, H. O & Odom. A. M. (2011). Collaboration and the
use of Technology in anti- Human trafficking efforts.
University of Colorado, Boulder, USA, Pp.2-10.
scholar.colorado.edu/cgi/viewcontent.cgi?article=1862&conte
xt=honr_theses
Rahman, A.M. (2011). Human Trafficking in the era of
Globalization: The case
of Trafficking in the Global Market Economy. Transcience
Journal Vol 2, No 1 (2011). https://www2.hu-
berlin.de/transcience/Vol2_Issue1_2011_54_71_Glossary.pdf
Rodas, E. (2014). The Multi-Facets of Cyber-Sex Trafficking.
A Call for Action and Reform from Society. The Multi-Facets
of Cyber-Sex Trafficking. A Call for Action and Reform from
Society. Munich: GRIN Verlag, P.1, http://www.grin.com/en/
e-book/ 274893/the-multi-facets-of-cyber-sex-trafficking-a-
call-for-action-and-reform
Rwanda Child‟s rights policy. (2011). Strategic Plan for the
Integrated Child Rights. Kigali: Ministry of gender and Family
promotion, P.14-26. https://www.unicef.org/rwanda/RWA_
resources_icrpstratplan.pdf
Rwanda Human rights council. (2010). The framework of the
universal periodic review. Kigali, P.7, www.undp.org/.../
rwanda/.../RW_UPR%20Report%20submitted%20by%20the
%20G...
Rwanda National Police. (2014).Police Review: Anti-Gender
based violence and child abuse. Kigali: Police Head office,p1.
http://www.police.gov.rw/uploads/tx_download/Rwanda_Nati
onal_Police_at_a_glance_2014_4_pages_HiRes.pdf
Rwanda National police strengthens fight against human
trafficking.(2015 Jan 8).Rwanda National police news,p.1,
http://www.police.gov.rw/news-
detail/?tx_ttnews%5Btt_news%5D=3364&cHash=b13a47abf0
4a0816357ab18b5c6c9d78
Rwanda National youth policy. (2015).Towards a happy
generation.Kigali:NYC,PP.14-18.
www.nyc.gov.rw/fileadmin/templates/template_new/.../Nation
al_Youth_Policy.pdf
Rwanda Police magazine. (2016).President Kagame: Let‟s not
be easy targets for Fraudsters. Kigali: Rwanda National
Police,p.5,https://www.police.gov.rw/uploads/tx_download/P
OLICE_MAGAZINE_No_15.pd
Sandys, E. (2005).Gender equality and empowerment of
women through ICT.United nations: Division of social and
economic affairs, p.14. www.un.org/womenwatch/daw/public/
w2000-09.05-ict-e.pdf
US state Department.(2013).Trafficking in Persons: Topics of
special interest. US State department: Office to monitor and
combat Human traffickinghttps://www.state.gov/j/tip/rls/tiprpt
/2013/210544.htm
UN.GIFT. (2008).The Vienna forum to fight human
trafficking: Human trafficking and Technology, Vienna: Anti-
human trafficking Unit.Pp,2-25. https://www.unodc.org/
documents/humantrafficking/2008/BP017TechnologyandHum
anTrafficking.pdf
UN.GIFT. (2008).The Vienna Forum to fight Human
Trafficking. Workshop: Technology and Human Trafficking.
Austria Center Vienna. Page 1-28