2015
DOI: 10.1093/bjc/azv027
|View full text |Cite
|
Sign up to set email alerts
|

The Structure of Human Trafficking: Lifting the Bonnet on a Nigerian Transnational Network

Abstract: The structure of human trafficking: Lifting the bonnet on a Nigerian transnational network Contrary to widespread belief, human trafficking operations are characterised by significant costs, particularly monitoring costs, and diseconomies of scale. How do traffickers achieve high capacity in their operations? This paper is an empirical in-depth study of the structure and activities of a large-scale human trafficking ring operating between Nigeria and Europe. It is based on a set of novel data sets that was man… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
48
0
1

Year Published

2017
2017
2024
2024

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 64 publications
(50 citation statements)
references
References 42 publications
1
48
0
1
Order By: Relevance
“…Kleemans and de Poot, 2008). In particular, social network analysis has been used to identify the centrality of key members of criminal networks and their relative influence on criminal activity (Campana and Varese, 2013;Campana, 2016). Adapting similar methods with a focus at the group level could shed further light on how gangs and radical networks operate and, crucially, on processes for desistance.…”
Section: Discussionmentioning
confidence: 99%
“…Kleemans and de Poot, 2008). In particular, social network analysis has been used to identify the centrality of key members of criminal networks and their relative influence on criminal activity (Campana and Varese, 2013;Campana, 2016). Adapting similar methods with a focus at the group level could shed further light on how gangs and radical networks operate and, crucially, on processes for desistance.…”
Section: Discussionmentioning
confidence: 99%
“…Furthermore, the definition of trafficking given by the Protocol has been criticized on the last years for having a limit definition, widely vague and for its narrow application (Roth, 2012;Jansson, 2013;Gallagher, 2010). Despite the recent discussion on the subject, this chapter analyses the presence of the three elements given by the protocol: Act (transfer), Means (coercion, abduction, abuse of position of vulnerability, deceit, fraud) and Purpose (Exploitation) on the phenomena of Smuggling and Human Trafficking.…”
Section: The Concept Of Vulnerability In the Division Between Smugglimentioning
confidence: 99%
“…They perform a single, highly specific task only (guiding a group through the desert, cooking, recruiting, driving) (Zhang 2007;Campana 2016) which is performed in coordination with other facilitators. Facilitators are not always known to each other -they may live in different cities, states and even countries.…”
Section: Smugglers and Their Viewsmentioning
confidence: 99%
“…Globalization should not be simply translated as a synonym of the ability of an organization or group to become mobile or operate at a different location at will (Varese 2011, 4). Most smuggling operations are set up at the local level (Campana 2016;Zhang 2007;Chu 2010) or within migrant or asylum seeker communities (Majidi 2016;Sanchez 2015). While interactions and encounters with members of other criminal organizations do take place, they suggest, rather than the existence of transnational collaborations or partnerships among criminal groups, the presence of communications and exchanges among them, and the sharing of routes and most likely similar mechanisms for their operations, but not the domination or take-over of a specific group (Wolf 2012).…”
Section: Smuggling Violence and Organized Crimementioning
confidence: 99%