You are on page 1of 74

COLLEGE OF ARTS AND SOCIAL SCIENCE

SCHOOL OF ECONOMICS AND GOOD GOVER NANCE

DEPARTMENT OF PROFESSIONAL POLICE STUDIES, YEAR IV

ACADEMIC YEAR: 2023

ASSESSING THE IMPACT OF INFORMATION TECHNOLOGY ON HUMAN


TRAFFICKING IN RWANDA
A CASE STUDY OF GASABO DISTRICT/KIGALI CITY

A Research Proposal Submitted to the School of Social, Political and Administrative


Sciences in Partial Fulfilment of the Requirements for the Award of a Bachelor’s
Degree of arts with Honors in Professional Police Studies (PPS)

Prepared by: ……………………


o
REG N : ....................................

Supervisor:......................................

i
DECLARATION

I, ……………………….., I do declare that this research entitled “assessing the impact of


information technology on human trafficking in Rwanda” is my genuine work, where
others’ works have been used, sources have been acknowledged. It has not been presented in
any other institution of higher learning for any academic qualifications.

…………………………………………

………………………………………….

Signed on……/……. /………….

i
APPROVAL

I………………………………., hereby certify that the study entitled “assessing the impact
of information technology on human trafficking in Rwanda”is an original work of
.................................................. under my supervision.

Signature: ………………………

........................................................

Date: ……………….………….

ii
DEDICATION

To my GOD almighty

iii
AKNOWLEDGEMENTS

Firstly I would like to express my great thanks to my God for his countless love that has
offered to me to complete this final dissertation from the beginning up to now. Secondly I
would like to express greatest gratitude to my Supervisor ……………………… who took
particular time to shape my work. I appreciate his helpful assistance, support and guidance in
dissertation writing process. Without his useful suggestions and feedback, I could not reach
this stage.

Furthermore, I deeply thank the Government of Rwanda especially Rwanda National Police,
University of Rwanda (UR) in general and College of Arts and Social Sciences (CASS) in
particular for giving me educational chance, requirements and efforts to lead my academic
activities in success. Besides, Special thanks go to different categories of my respondents,
with the assistance and facilities in providing useful information for making this research
work achievable.

Again, tons of love and thanks go to all my family members and my nearest friends for their
big contributions during my studies. I highly appreciate their continuous love, care and
supports during the journey of writing this dissertation. Finally, I express many thanks and
blessings to my colleague students of PPS year four ……………………………….. intake for
their encouragement and close collaboration within the academic environment. Your tangible
efforts and support will never be forgotten.

iv
TABLE OF CONTENTS
DECLARATION....................................................................................................................................i
APPROVAL..........................................................................................................................................ii
DEDICATION......................................................................................................................................iii
AKNOWLEDGEMENTS.....................................................................................................................iv
ABBREVIATIONS AND ACRONYMS............................................................................................viii
LIST OF TABLES................................................................................................................................ix
LIST OF FIGURES..............................................................................................................................ix
1.1 Background to the study..............................................................................................................1
1.2 Problem statement.......................................................................................................................3
1.3 Research objectives.....................................................................................................................5
1.3.1 General objective....................................................................................................................5
1.3.2 Specific objective....................................................................................................................5
1.4 Research questions......................................................................................................................5
1.5 Scope of the study........................................................................................................................5
1.6 Interest/significance of the study.................................................................................................6
1.6.1 The researcher.........................................................................................................................6
1.6.2 The law enforcement officials................................................................................................6
1.7.3 The general public..................................................................................................................6
1.7.4 The research community.........................................................................................................6
1.8 Organization of the study.........................................................................................................7
1.9 Conceptual framework.................................................................................................................7
CHAPTER II: LITERATURE REVIEW..............................................................................................9
2.1 Definition of key concepts...........................................................................................................9
2.1.1 Human trafficking...................................................................................................................9
2.1.2 Information Communication Technology............................................................................10
2.2 Major types of human trafficking..............................................................................................10
2.2.1 Sex trafficking.......................................................................................................................10
2.2.2 Labour trafficking.................................................................................................................11
2.3 Forms of Human Trafficking.....................................................................................................12
2.3.1 Child Labour.........................................................................................................................12
2.3.2 Child sex trafficking.............................................................................................................12
2.3.3 Debt bondage........................................................................................................................12
2.3.4 Involuntary domestic servitude.............................................................................................13
2.4 Potential causes of human trafficking........................................................................................13

v
2.4.1 Poverty..................................................................................................................................13
2.4.2 Armed conflicts/ disasters and Political instability...............................................................14
2.4.3 Globalization and global demand for cheap labour..............................................................14
2.4.4 Organized criminal syndicates and human trafficking.........................................................14
2.4.5 Corruption, political instabilities and human trafficking......................................................15
2.4.6 Growth of global commercial sex market.............................................................................16
2.5 The main technological tools and their influence on human trafficking....................................16
2.5.1 Mobile phones.......................................................................................................................16
2.5.2 Desktops, laptops, tablets......................................................................................................17
2.5.3 Camera and video technologies and associated outputs.......................................................17
2.5.4 Television..............................................................................................................................17
2.5.5 Online dating sites................................................................................................................18
2.5.6 Dark-web and Applications..................................................................................................18
2.6 ICT based strategies to eradicate human trafficking..................................................................18
2.6.1 Training law enforcement officials to identify and respond to cases of HT.........................19
2.6.2 E-learning training programmes to raise awareness.............................................................19
2.6.3 Facial reconstruction technologies in human trafficking cases............................................20
2.6.4 Alerting people the risks associated with the use of technology..........................................20
2.6.5 Financial tracking.................................................................................................................20
2.7 Conclusion.................................................................................................................................21
CHAPTER III: RESEARCH METHODOLOGY................................................................................22
3.1 Introduction...............................................................................................................................22
3.2 Research design.........................................................................................................................22
3.2.1 Qualitative approach.............................................................................................................22
3.2.2. Quantitative approach..........................................................................................................22
3.3 Study Population........................................................................................................................23
3.4 Sampling strategies and sample size determination...................................................................23
3.4.1. Purposive sampling..............................................................................................................23
3.4.2. Convenience sampling.........................................................................................................24
3.4.3. Snowball sampling technique..............................................................................................24
3.5 Procedures of data collection.....................................................................................................25
3.6 Data collection methods and instruments...................................................................................25
3.6.1. Primary data collection........................................................................................................25
3.7 Data quality control...................................................................................................................26
3.8 Ethical considerations................................................................................................................26

vi
3.9 Data analysis..............................................................................................................................27
3.10 Conclusion...............................................................................................................................27
CHAPTER III: RESEARCH METHODOLOGY................................................................................28
3.1 Introduction...............................................................................................................................28
3.2 Research design.........................................................................................................................28
3.2.1. Qualitative approach............................................................................................................28
3.2.2. Quantitative approach..........................................................................................................29
3.3 Study Population........................................................................................................................29
3.4 Sampling strategies and sample size determination...................................................................29
3.4.1. Purposive sampling..............................................................................................................29
3.4.2. Convenience sampling.........................................................................................................30
3.4.3. Snowball sampling technique..............................................................................................30
3.5 Procedures of data collection.....................................................................................................31
3.6 Data collection methods and instruments...................................................................................31
3.6.1. Primary data collection........................................................................................................31
3.7 Data quality control...................................................................................................................32
3.8 Ethical considerations................................................................................................................32
3.9 Data analysis..............................................................................................................................33
3.10 Conclusion...............................................................................................................................33
CHAPTER FOUR: PRESENTATION, ANALYSIS, AND INTERPRETATION OF THE FINDINGS
.............................................................................................................................................................34
4.1 Introduction...............................................................................................................................34
4.2 Background characteristics of the respondents..........................................................................34
4.2.1 Gender of respondents..........................................................................................................34
4.2.2 Education level of the respondents.......................................................................................35
4.2.3 Respondents age group.........................................................................................................36
4.2.4: Respondents marital status..................................................................................................37
4.3 Views on the causes of human trafficking.................................................................................38
4.4.2 Views on types of human trafficking....................................................................................41
4.4.3 Views on the main forms of human trafficking....................................................................42
4.5 Technological tools that influence human trafficking................................................................42
4.6 Views on tech strategies to fight against human trafficking.......................................................43
4.7 Conclusion.................................................................................................................................44
REFERRENCE LIST..........................................................................................................................48
APPENDICES.....................................................................................................................................55

vii
Appendix I: STRUCTURED QUESTIONNAIRES FOR INHABITANTS OF GASABO DISTRICT
.............................................................................................................................................................56
APPENDIX II: Interview guide with the victims of human trafficking...............................................59
RESEARCH PERMISSION LETTERS..............................................................................................61

viii
ABBREVIATIONS AND ACRONYMS

CASS: College of Arts and Social Sciences

U.S: United States

TVPA: Trafficking Victims Protection Act

ILO: International Labour Organization

HIV/AIDS: Human Infection Virus/

OSCE: Action Plan to Combat Trafficking in Human Beings

WHO: World Health Organization

IP: Internet Protocol

UNODC: United Nations Organization for Drug Control

TV: Television

HT: Human Trafficking

DNA: Deuoxilibo Nucleic Acid

ESP: Electronic Service Providers

IOM: International Organization for Migration

SPSS: Statistical Package for Social Sciences

ix
LIST OF TABLES

Table 3.2: Recapitulative table of research population, sample size, sampling techniques and
research instruments ……………………………………………………………...........…….42

Table 4.1: Distribution of respondents by their age group………………….………………..48


Table 4.2: Respondents views on the causes of human trafficking………………………..…50
Table: 4.4: Respondents’ views on technological strategies to fight human trafficking….....54
Table4.3: Respondents views on the forms of human trafficking influenced by technology..53

LIST OF FIGURES

Figure: 1.1: Conceptual frameworks……………………………………………………..….19

Figure 2.1: Elements necessary to meet the above definition……………………………….22


Figure 2.1: Elements necessary to meet the above definition……………………….………27
Figure: 4.1: Respondents‟ gender/sex group…………………………………………….…..46

Figure 4.2: Respondents level of education……………………………………………….....47

Figure 4.3: Respondents’ marital status…………………………………………………...…51

Figure 4.4: Respondents knowledge on the definition of human trafficking…………...……51

Figure 4.5: Respondents views on the types of human trafficking existing in Rwanda……..52

Figure 4.6: Respondents views on the most technological tools influencing human
trafficking…………………………………………………………………………………….54

x
ABSTRACT

The present study intended to examine the influence of information technology on human
trafficking. The study was aimed at fulfilling four specific objectives namely to examine the
potential causes of human trafficking, to ascertain major types and forms of human
trafficking that have been practiced in Rwanda to investigate into the main technological
tools and their influence on human trafficking and lastly to suggest the way forward to the
human trafficking vice. Both qualitative and quantitative data collection techniques were used
throughout this study. Qualitative data were collected from the interview with 15 victims of
human trafficking and 13 law enforcement representatives, these were data were gathered in
order to support quantitative data retrieved from questionnaires administered 95 ordinary
residents of Gasabo districts selected as sample from the whole district. To get the sample
size the researcher used different sampling techniques which involved snow ball,
convenience and purposive sampling techniques. Furthermore, the primary data were
collected using both questionnaires and interviews. Findings on the potential causes of human
trafficking revealed that poverty plays the big role however other causes were mentioned by
respondents including armed conflicts/ disasters and Political instability, gglobalization and
global demand for cheap labour, organized criminal syndicates and human trafficking and
corruption, political instabilities and human trafficking. On the other side the major types of
human trafficking that exist in Rwanda discussed were labour trafficking, sex trafficking,
debt bondage and involuntary domestic servitude. To the forms of human trafficking most
practiced in Rwanda child sex trafficking and child labour trafficking were mentioned as the
main forms of human trafficking existing in Rwanda. In addition to that the study revealed
that there are the main technological tools mostly influencing human trafficking, telephones,
camera and video cameras were the main tools that influence human trafficking. Findings on
the tech strategies to counter human trafficking indicated that sensitizing the public on the
risks associated with the use of technology and training the law enforcement officials as the
main strategies that can be adopted among others. Our list of recommendations calls for
action of different parties and it is beyond the scope of this summary.

xi
CHAPTER I: GENERAL INTRODUCTION

This chapter will cover the background of the study, the problem statement, main and specific
objectives of the study, research questions, scope, and delimitation of the study, significance
of the study and the subdivisions of the study.

1.1 Background to the study

Trafficking in human beings is a major concern for the global community. Reintroduced
discussion over the accurate definition of the concept of trafficking started, however, in the
second half of the 1990s (Outshoorn, 2005). More clearly than in the past, this debate has
been linked to international migration, together with a discussion of the concepts of “illegal”,
“irregular”, “unauthorised”, “undocumented” or “clandestine” migration, “smuggling” and
“organised crime”, notions which are intimately associated with “trafficking” (Apap, et
al., 2002). The main victims of trafficking according to Winterdyk and Reichel (2010) are
women and children. We cannot say illegal trade, profit and crime, coercion, deception,
violence and exploitation while ignoring the concept of trafficking in humans (Sigmon,
2008).

For the sake of this study human trafficking means the acts by which the individual becomes
a commodity consisting in recruitment, transfer of a person to another part of the country or
to another country by use of deception, threat, force or coercion, position of authority over
the person, in most cases for the purpose of harming his/her life or unlawfully exploiting by
indecent assault, prostitution, unlawful practices, practices similar to slavery by torturing and
subjecting to cruel treatment or domestic servitude because he/she is vulnerable.

According to the Congressional Research Service (CRS) and the U.S. State Department, in
2001 between 700,000 to 2 million people, the majority being women and children were
trafficked each year across international borders (McGaaha, et al 2009). As asserted by
Kligman and Limoncelli (2005) in Europe, an increasing portion of the trafficked women
comes from the former socialist countries. However, the flourishes of trade in human beings
is highly attributed to the advances in technology which make it faster, easier cheaper and
eventually more profitable to conduct transactions and communication between traffickers
and in some instances victims.

1
According to Obuah (2006) the world estimates 900,000 people being trafficked every year.
A recent U.S. Government estimate indicates that approximately 800,000- 900,000 people
annually are trafficked across international borders worldwide and between 18,000 and
20,000 of those victims are trafficked into the United States (Di Nicola, 2013), Trafficking in
women is very profitable with revenues more than seven billion dollars annually. The
availability of easy communication through social media platforms, hardware and
communication apps hastened a growing number of people who want to search for work
abroad who are deceived by traffickers into leaving their countries, believing that they will
work as dancers or hostesses, or even as prostitutes, but instead end up living under slave-like
conditions where their fundamental human rights are violated (Hughes, 2000).

The introduction, growth, and utilisation of information and communication technologies


(ICTs) have been accompanied by an increase in illegal exploitation and abuse of technology
for criminal activities (Longe, et al. 2009). With respect to cyberspace, the internet is
increasingly used as a tool and medium by transnational organised crime. Human trafficking
is an obvious form of organised crime that has been affected by the global revolution in ICT
(Van Reisen, et al. 2017).

This illicit activity is also connected with other forms of transnational criminal behaviour that
developed in response to advance in ICT such as corruption, fraud, coercion, and money
laundering. Thus, for Winterdyk and Reichel (2010) there is persisting need for international
cooperation, especially between countries of origin, transit, and destination to monitor
technological tools adapted by criminals to enhance their activities.

The vice of human trafficking did not left Rwandans untouched due to the fact that is
technologically advancing, in the report of UNHCR of 2015, Rwanda is found to be a source,
and to a lesser degree, a transit and destination country for a limited number of women and
children subjected to forced labor and sex trafficking. The report enumerated that the primary
destination for Rwandan victims is Uganda, but it continued by highlighting other parts of the
world where Rwandan victims are exploited including East Africa, South Africa, United Arab
Emirates (UAE), Malaysia, China, the United States, and Europe. Rwanda being a transit
country as identified by Miko (2006) some foreign nationals transit Rwanda before
experiencing exploitation in third countries.

2
The idea evidenced by the number of potential human trafficking cases tallying 19 cases as
reported by the government of Rwanda in 2015, these involved 26 alleged perpetrators, it
continued to implement domestic policies and programs to prevent trafficking, including the
2014-2017 national anti-trafficking action plan. President Kagame directed the ministry to
review Rwanda’s anti-trafficking legal provisions to increase penalties for trafficking
offenses during the national dialogue (Ngabonziza, 2014).

ICTs are also providing new means and tools that facilitate human trafficking, especially for
sexual exploitation. On such a basis, this new form of organised crime presents new
challenges to lawmakers, law enforcement agencies, and transnational human rights
organisations (Nuth, 2008). This necessitates the need for an effective supra-national as well
as domestic mechanisms that monitor the utilisation of ICT for criminal activities and uphold
essential human rights and freedoms.

This white paper seeks to address and analyse the impact of ICTs on trafficking in human
beings. Finally, this paper will conclude by discussing the steps that should be taken to
protect human beings against human trafficking that violates their rights and how can we
utilize ICTs in tackling illegal criminal activities with special emphasis to human trafficking.

3
1.2 Problem statement

Every year, thousands of men, women and children fall into the hands of traffickers, in their
own countries and abroad. Trafficking in persons is a serious crime and a grave violation of
human rights (Fitzpatrick, 2002). The former Soviet Union has become the largest new
source of forced prostitution with more than 100,000 trafficked each year from the new
independent states after the industrial revolution. More than 75,000 are trafficked from
Eastern Europe, 100,000 from Latin America and the Caribbean, and over 50,000 from
Africa and taken to (IHRW report, 2017).

According to Savona and Williams (2002) the world’s transition into an information society
is being marked by profound developments in all aspects of human life: in work, education
and leisure, in government, industry and trade. The use of ICTs in trafficking in human
beings involves the utilisation of computers, mobiles phones and other network based
platforms. Hearn (2006) added that these ICT tools are also providing new means and tools
that facilitate human trafficking activities.

The vice of human trafficking in Rwanda gained momentum year after year for instance
between 2009 and 2013, RNP rescued 153 people (RNP, 2013), in August, 2013, President
Paul Kagame weighed in strongly on the matter, calling on officials to fight what he then
referred to as a growing problem. “Can we afford to keep quiet in the face of human
trafficking? People are not commercial goods. Ending trafficking of girls goes beyond law
enforcement authorities; it is the responsibility of every citizen,” Kagame said (Kwibuka,
2014).

On September 20, 2016 Police rescue 28 people who were duped into human trafficking
believing they could get a better life in Australia only to find themselves stuck midway in
Burundi where they had been taken apparently to process forged travel documents. The
victims said that they met a certain pastor during a crusade at Evangelical Restoration Church
in Masoro, Gasabo District, who convinced a better life in Australia. “This man presented to
me and my family a number of opportunities that we would get if we went to Australia. He
asked us to give him Rwf2.4 the money he said would be used for processing our travel
documents” Julienne Kamariza, one of the victims said (RNP Magazine, 2028).

4
According to Kozma and Vota, (2014), Rwanda continues to be one of the fastest growing
African countries in ICT. The development of ICT based life in Rwanda has been misused by
criminals, their communication has been facilitated by the information communication that is
available in all parts of the country, traffickers use messaging and calls through different
channels of communication to access the victims. The improvement in mobile phone and
fibre optic networks as well as computer usage and internet access enabled both positive uses
to general public and at the same time adopted by criminal bands.

Though technology had become and is a fascinating science, we are not yet at the point where
computers can-by themselves-engage in criminal activity (Chawki&Wahab, 2005). ICTs can
be accessed by however knows how to use those tools, it is in this line that though technology
is improving our daily life it is a double edged sword. There are people usually known as
traffickers who by using ICT tools plan, prepare, coordinate and initiate the criminal act
(Aronowitz, 2009), the factor that describe the co-existence in the use of ICT and human
trafficking.

Traffickers utilize friends of friends and word-of-mouth to identify and target youth who can
access internet and especially those who in vulnerable situations like unemployment.
Traffickers are also able to manipulate potential victims’ lives in real-time by utilizing
technology to text or share and tag photos on social networking sites for the viewers to be
fascinated. These technologies therefore can impact various aspects of trafficking, from
grooming, recruitment, and control of victims, to advertising, movement, and financial
transactions as far human trafficking are concerned.

The present study therefore; aim to discuss the influence of information communication
technology in facilitating human trafficking or in other words the role of ICT advancement in
Rwanda and its impact on trafficking in human beings.

1.3 Research objectives

This research was guided by two distinct objectives: general and specific objectives

1.3.1 General objective

General objective of this study will be to assess the impact of information technology on
human trafficking in Rwanda

5
1.3.2 Specific objective

1. To examine the potential causes of human trafficking


2. To ascertain major types and forms of human trafficking that have been practiced in
Rwanda
3. To investigate into the main technological tools and their influence on human trafficking
4. To suggest the way forward to the human trafficking vice

1.4 Research questions

1. What are the potential causes of human trafficking?


2. What are the major types and forms of human trafficking practiced in Rwanda?
3. What are the main technological tools and their influence on human trafficking?
4. What is the way forward to human trafficking facilitated by information technology in
Rwanda?
1.5 Scope of the study
The scope of this research is delimited in space and time. It is believed to have started in
April 2019 and it is expected to end in July 2019. It would have been extended to the entire
territory of Rwanda since the vice of human trafficking is a general issue and it affects
everyone in every corner of the country. However, due to the fact that money and time
required to carry out a research like this on the entire country are not available now, it will
therefore be carried out in Gasabo district.

1.6 Interest/significance of the study

The present study will be beneficial to the general public, the researcher himself, different
government agencies and to the research community in the following ways:

1.6.1 The researcher

The present study will be a momentous endeavour in developing researcher’s knowledge and
skills on how to conduct a research. Furthermore, at the end of this study, it will serve as a
partial fulfilment of requirements for the award of bachelor’s degree of arts with honors in
professional police studies.

6
1.6.2 The law enforcement officials

The present study will be a prominent attempt to awaken law enforcement officials for better
understanding of human trafficking-facilitated technology, in order to take appropriate
measures to counter the vice of human trafficking, the need to control the use of technology
by criminal groups including human traffickers will be enhanced if officials are trained on the
use of cyber space to counteract criminal pass through.

1.6.3 The general public

Since human trafficking is a general issue and it affects both young and old people, and since
the use of technology is developing on a swift speed, the link between human trafficking
should not be overlooked. People will therefore be informed of how technology is misused by
traffickers to trick them through social media platforms.

1.7.4 The research community

To the research community, the findings of this study will contribute as a ground work for
supplementary researches in this area of studying the impact of information, communication
technology on different forms of criminality. Though this study is only based on human
trafficking, the research community will be motivated to carry out researchers on other
technology assisted crimes. There is a need to extend this research on the entire country since
this one will only focus on Gasabo district in Kigali city.

1.8 Organization of the study

This study is subdivided into five chapters: the first chapter presents an introduction which
includes the background of the study, problem statement, specific objectives, research
questions, scope, significance, and the subdivision of the study. The second chapter is the
literature review, which covers what others have written in relation to the topic. The third
chapter will be methodology consists research design, population, sample and sampling
techniques, sample size, data collection techniques and data analysis. The most method used
in data collection is primary data collection method.
The fourth chapter will present the analysis and interpretation of outcome from the collected
data. The fifth chapter is the summary of findings and recommendations.

7
1.9 Conceptual framework

From the figure below causes of human trafficking are believed to be independent from any
other factor discussed in the figure. People’s access to hard wares like mobile phones,
cameras, televisions, desktops and laptops has made it easy to interact with everyone in every
corners of the world, that has been facilitated by social networks and other online platforms,
it is in this case that the same channel is being misused by criminal groups to interact with
victims and their collaborators all over the world. The channel enabled easy communication,
recruitment, coordination and exploitation in human trafficking matters. The need to train law
enforcement officials, to raise public awareness on human trafficking, to raise technological
advancements ahead of the criminal gangs have been identified as prevention measures to
human trafficking influenced by technology.

Figure: 1.1 Conceptual frameworks

Independent variables Facilitating ICT tools Dependent variables

Causes of HT Connecting factors End results

-Poverty  Mobile phones  Communication


-Armed conflicts/ disasters  Desk tops, lap tops, tablets  Recruitment
and Political instability
 Camera and video technologies and  Coordination
-Globalization and global associated outputs
demand for cheap labour  Exploitation
 Television
-Organized criminal
syndicates and human  Online dating sites

trafficking  Dark-web and Applications


-Corruption, political
instabilities and human

8
trafficking

ICT Prevention/Intervention measures

-Training law enforcement officials to identify


and respond to cases HT

-E-learning training programmes to raise


awareness

-Facial reconstruction technology in HT cases

-Alerting Rwandans the risks associated with


the use of technology

-Financial tracking

9
CHAPTER II: LITERATURE REVIEW

This chapter highlights the theoretical base of this study, the selected literature of this study
and all the major terms and their definitions as used throughout the study. It further reviews
the ideas, arguments, and perceptions from different authors, scholars, and intellectuals in
accordance with the present study objectives.

2.1 Definition of key concepts

The definitional and literature reviews of the topic under study have accompanied key
concepts discussed as follows:

2.1.1 Human trafficking

According to the United Nations Department of Defense and Crime (2002), the definition of
trafficking in persons’ means “the recruitment, transportation, transfer, harboring or receipt of
persons, by means of threat or use of force or other forms of coercion, of abduction, of fraud,
of deception, of the abuse of power or of a position of vulnerability or of the giving or
receiving of payments or benefits to achieve the consent of a person having control over
another person, for the purpose of exploitation. Exploitation shall include, at a minimum, the
exploitation of the prostitution of others or other forms of sexual exploitation, forced labor or
services, slavery or practices similar to slavery, servitude or the removal of organs.Potential
victims attempt to move from areas with extreme poverty to areas with less extreme poverty.
In these instances, it is the desire of potential victims to migrate to escape poverty that is
exploited by traffickers.

10
Figure 1.1: Conceptual frameworks

Process actions Particulars means For the purpose of:


Recruitment Force Involuntary servitude
Or Or Or
Harbouring Fraud Forced labour
Or Or Or
Moving Coercion Debt bondage
Or Or Or
Obtaining a person Deception Slavery
Or
Sexual exploitation
Source: (Farrell, et al., 2014)

2.1.2 Information Communication Technology

Information communication technology (ICT) according to Mcloughlin & Catherine (2011) is


the use of any computers, storage, networking and other physical devices, infrastructure and
processes to create, process, store, secure and exchange all forms of electronic data. The
commercial use of IT encompasses both computer technology and telephony technology
which all are there to ease communication and transfer of information. Due to the
advancement in ICT, supply and demand in human trafficking have increased through the
years partially. Traffickers utilize social media, dating sites and online advertisements to
market minors and trafficked victims (Hughes, 2014). The present study’s main purpose is to
discern the functions of ICT in the facilitation of human trafficking.

2.2 Major types of human trafficking

There are two major types of human trafficking:

2.2.1 Sex trafficking

The UN’s Protocol to Prevent, Suppress and Punish Trafficking in Persons, Especially
Women and Children defined sex trafficking by including three elements in its definition: the
act, the means and the object. Sex trafficking is the recruitment, transportation, transfer,
harbouring or receipt of persons who under threat, force, coercion, fraud, deception or abuse
of power are sexually exploited for the financial gain of another (Defeis, 2003). Whereas
11
the U.S. Trafficking Victims Protection Reauthorization Act (2013) defines sex trafficking as
the recruitment, harbouring, transportation, and provision or obtaining of an individual who
under force, fraud or coercion is induced to perform a commercial sex act (Chaffee &
English, 2015). All in all sex trafficking does not necessarily require to have some form of
travel, transportation or movement across borders. At the core, sex trafficking is
characterized by sexual exploitation through force, fraud or coercion.

2.2.2 Labour trafficking

In recent years, there is an increased awareness of people being trafficked to attain body
organs for transplantation. Trafficking Victims Protection Act of 2000 (TVPA) defines labor
trafficking as: “The recruitment, harboring, transportation, provision, or obtaining of a person
for labor or services, through the use of force, fraud or coercion for the purpose of subjection
to involuntary servitude, peonage, debt bondage or slavery (Chapkis, 2005). This has much to
do with forced labor which the Forced Labor Protocol (Article 1(3)) explicitly reaffirms this
definition. For the purpose of this study labour trafficking is the recruitment, harbouring,
transportation, provision or obtaining of a person for labour or services through the use of
force, fraud or coercion for the purpose of subjection to involuntary servitude, peonage, debt
bondage or slavery.

This definition consists of three elements:

1. Work or service refers to all types of work occurring in any activity, industry or sector
including in the informal economy.
2. Menace of any penalty refers to a wide range of penalties used to compel someone to
work.
3. Involuntariness: The terms “offered voluntarily” refer to the free and informed
consent of a worker to take a job and his or her freedom to leave at any time. This is
not the case for example when an employer or recruiter makes false promises so that a
worker take a job he or she would not otherwise have accepted.

2.3 Forms of Human Trafficking

Human trafficking is not a single word by itself it portrays in different forms discussed
below:

12
2.3.1 Child Labour

Article 3 of International Labor Organization Recommendation No. 190 explained child labor
as the work which, by its nature or the circumstances in which it is carried out, is likely to
harm the health, safety or morals of children (Noguchi, 2002). Child labour according to
Lieten (2002) refers to the employment of children in any work that deprives children of their
childhood, interferes with their ability to attend regular school, and that is mentally,
physically, socially or morally dangerous and harmful. The term child labor simply means the
work that deprives children of their childhood, their potential and their dignity, and that is
harmful to physical and mental development (ILO, 2005). Purposely for the present study,
child labor would be referred to as forced works endorsed to children after when they are
trafficked whether internally or externally for the purpose of exploitation.

2.3.2 Child sex trafficking

Thousands of children are sold, or kidnapped for the purpose of sexual exploitation in hotels,
night clubs, brothels, massage parlours, private residences, on sex tours annually (Martens, et
al., 2003). The internet has made it easier for children to be bought and sold online. Law
enforcement simply does not have enough resources to navigate the massive online
commercial sex market to find children and identify their traffickers. Child sex trafficking has
devastating consequences on children including long-lasting physical and psychological
trauma, disease (HIV/AIDS), drug addiction, unwanted pregnancy, malnutrition, social
ostracism, and sometimes death in the countries where they are trafficked and exploited.

2.3.3 Debt bondage

Bonded labour is similar to slavery, because it involves a debt that cannot be paid off in a
reasonable time (Wheaton, et al, 2010). The employer/enforcer artificially expands the
amount of debt, often adding excessive interest or charges for living expenses, deducting
little or nothing from the debt and increasing the amount of time the individual must work.
For Murray (2000) debt bondage is a cycle of debt where there is no hope for freedom.
People who are tricked or trapped into debt bondage for very little or no pay are considered
bonded workers. Debt bondage are conditions imposed by traffickers as method of asserting
control over their victims while making additional money (Schauer, & Wheaton, 2006),
bonded labourers are forced to work to repay debts their employer says they owe. This form

13
of human trafficking involves broadcasting job offers and scholarships on social network
platforms as means to attract unemployed and vulnerable people to apply for work abroad.

2.3.4 Involuntary domestic servitude

Involuntary servitude occurs when a domestic worker becomes ensnared in an exploitative


situation they are unable to escape (Derby, 2009). Typically in private homes, the individual
is forced to work for little or no pay while confined to the boundaries of their employer’s
property. Those who impose involuntary domestic servitude isolate them to keep them from
communicating with family or any other type of support network, increasing the subjection to
psychological, physical and sexual abuse. Pope (2010) revealed thatrecruiting agencies trick
workers into moving abroad and then confiscate their documents. This type of human
trafficking is prevalent to the migrant workers, in many cases, these workers turned into
slaves are beaten by the families they serve and work from very early in the morning to late at
night (Hsu, 2007).

2.4 Potential causes of human trafficking

Human trafficking is not only motivated by technology advancements however, it is an


easing factor to boost other side causes examined in the following paragraphs as the potential
ones.

2.4.1 Poverty

Poverty is one of several factors that make individuals vulnerable to trafficking (Cullen-Du
Pont, 2008).According to OSCE Action Plan to Combat Trafficking in Human Beings (2016)
Poverty and wealth are relative concepts which lead to both migration and trafficking patterns
in which victims move from conditions of extreme poverty to conditions of less-extreme
poverty.Traffickers target people who have few economic opportunities and those struggling
to meet basic needs (Ehrenreich, et al., 2003).Living in poverty is a harsh reality to escape
from and people become desperate enough to enter into fraudulent employment schemes or
be deceived into prostitution. Moland (2010)declared that in some cases poor parents,
promised that their child will be educated, fed and treated well, may send their child,
sometimes in exchange for money, with a person the parents trust when in fact they are going
to be trafficked.

14
2.4.2 Armed conflicts/ disasters and Political instability

Internal armed conflicts and disasters may lead to massive displacements of populations,
leaving orphans and street children extremely vulnerable to trafficking. Unquestionably,
destabilization and displacement of the populations increase vulnerability to exploitation and
abuse through trafficking and forced labor (OSCE, 2016). Obviously women and girls are
likely to be abducted as forced prostitutes by armed groups during armed conflicts (WHO,
2008). Lee (2011) urges that states strategies to reduce human trafficking are likely to be
given low priority at times of conflicts. He furthermore, suggests that breakdowns in
governance facilitate complicity and corruption among officials and provides openings for
organized crime networks to expand the human trafficking.

2.4.3 Globalization and global demand for cheap labour

Rahman (2011) states that globalization encouraged expansion of world markets and profits
while ignoring the impact this has on vulnerable populations and at-risk communities. Human
trafficking has been likened to modern-day slavery, and in many respects, the similarities are
obvious. Slavery used to systematically exploit specific groups of people, while today,
anyone can be a human trafficking victim regardless of ethnicity, nationality, gender, age, or
economic status (Holman, 2008). Labor trafficking is a form of modern-day slavery in which
individuals perform labor or services through the use of force, fraud, or coercion (Kara,
2011). Human trafficking and the exploitation of low-wage workers is still pervasive, labor
trafficking as a form of human trafficking includes situations of debt bondage, forced labor,
and involuntary child labor all discussed in the previous paragraphs (Whiney, 2010).

2.4.4 Organized criminal syndicates and human trafficking

While organised crime has existed for centuries, it is only recently that the international
community has begun to take it seriously as a transnational ‘soft’ (i.e. non-military) security
issue (Williams, 2004). Organized crime is considered to be an evolving and flexible
phenomenon. Many of the benefits of globalization such as easier and faster communication,
movement of finances and international travel, have also created opportunities for
transnational organized criminal groups to flourish, diversify and expand their activities
(Turner & Kelly, 2008). Moreover, organized crime affects all states, whether as countries of

15
supply, transit or demand (Jones, et al., 2007). It is obvious to consider the linkage between
advancement in ICT, the flourishing criminal networks and organized crime of which human
trafficking takes part in. According to Turner & Kelly (2008) the following is how do
organized criminal groups engaged in sex trafficking operate.
i) Recruitment
Victims are usually recruited through family/friend networks and tend to be individuals
looking to make extra money. In some international network models, security guards, who
may be former military, are recruited from overseas because they can be paid less and they
can quickly leave the country if necessary(Turner & Kelly,2008).

ii) Operational security


Organized crime groups running sex trafficking operations are very sophisticated in their
operational security to evade law enforcement detection and to avoid dangerous buyers by
setting up illegal enterprises, bribing law enforcement officers, posting and following
“beware” on websites, and using aliases, burn phones, and code words. They check internet
protocol (IP) addresses of whoever is browsing on their websites and social network
platforms.

iii) Organizational structure


This study identifies four different organizational structures for organized crime groups
engaged in sex trafficking, the hybrid model, the international network model, the Gang
model, the Tenancingo and Mexico model. But human trafficking is now seen as the fastest
growing form of trafficking and, along with cybercrime, the preferred form of criminal
activity for an increasing number of criminal gangs and organisations.

2.4.5 Corruption, political instabilities and human trafficking

Political instability and an unsafe situation in the country of origin are considered to be
important political factors that push persons to leave their country in pursuit of a more stable
political environment (Agbu, 2003). Political changes and the emergence of a market
economy led to economic crisis and stagnation forced industrial restructuring, the breakdown
of social services, mass unemployment (a hitherto unknown phenomenon) and dramatically
lower living standards for large portions of the population (Bales, 2007). Consequently, the
political, economic and social uncertainty during the transition phase led to mass migration.
People now have the unparalleled opportunity to obtain a passport for both travel and

16
migration purposes. As it has been said in the previous paragraphs, traffickers often target
those wishing to explore for basic needs solution.

2.4.6 Growth of global commercial sex market

In the global market of sex trafficking there are sellers (traffickers), consumers (johns), and
products (victims) Penington and Julia (2008).There is, however, growth of a globalized market
for commercial sex services according to Lee (2011) which has favored the organized
criminals group to go on in their businesses of human trade. According to Cullen-Du Pont
(2009), the legalization of prostitution is thought by authors to provide more transparency and
protection to women in sex trade. Without the demand for services there would be no market
for this particular product sex trafficking victims. The sex trafficking of persons is driven by
demand for the menu of commercial sex acts they are forced to perform and how they are
packaged. As the demand increases, traffickers must increase the supply of victims
(Mullings, 1999). The buyer in this marketplace views the victim as a dehumanized product
for immediate consumption and disposal.

2.5 The main technological tools and their influence on human trafficking

Trafficking in persons requires extensive coordination throughout the process of planning,


recruiting victims, transporting them, meeting and transferring people at various times and
locations. It is believed that increased use of technologies have made trafficking activities
easier to perform using technological tools discussed underneath:

2.5.1 Mobile phones

Mobile phone is the basic technology that is easily available and accessible to many people.
According to World Bank report (2018) 75% of the global population has access to a mobile
phone. Latonero et al (2016) studied the role of mobile phones and he observed that mobile
phones are one of the most important tools that help to facilitate sex trafficking of minors in
the US. Via mobile phones criminal networks are taking advantage of phone technology to
reach larger audiences (Musto, 2012). Advances in smart mobile phones enabled access to
the internet social networking sites and adult entertainment sites that facilitate
humantrafficking. Traffickers benefit the use of mobile phones to recruit, advertise, organize,
and communicate predominantly for easing human trafficking.

17
2.5.2 Desktops, laptops, tablets

Desktop computer is a form of computer that is predominantly stationary, laptop can be used
at home or in an office whilst, tablets act in a similar manner to a laptop in that they are
mobile to be used on the go and travelling. Desktop, laptop computers and tablets are used
by traffickers to record, edit, transmit and receive information across the globe (Durkin &
Bryant, 2001). These tools are contributory in the counterfeiting of documents of human
trafficking victims and traffickers themselves (Choo, 2008). They provide users with the
means to access the various applications and are thus vital to those involved in the trafficking
of human beings. Desktop, laptop and tablet technology makes it faster, easier cheaper and
ultimately more profitable to conduct transactions between traffickers.

2.5.3 Camera and video technologies and associated outputs

Video and image material tools are simply used for the purpose of sexual exploitation
(Quayle & Taylor, 2002). UNODC (2005) identified that the forgery of documents such as
passports, national identity cards which require image of the victim or the trafficker
contributes to the facilitation of human trafficking. Images and video material can be used to
further exploit trafficked persons. Cameras and video cameras tech facilities provide a means
of capturing, monitoring, control and sharing images of people being under trafficking tail.

2.5.4 Television

The attractiveness of cable and satellite TV shows that it is a powerful tool in delivering news
and entertainment to audiences around the world. Hughes (2002) acknowledged that only one
in eight major cable companies in the US does not offer pornographic movies. Additionally
the Guardian article of 25th July 2014 has debated that ‘Adult TV stations are leading a boom
in new channel launches across Europe. According to Farley (2012) porn and internet sex
shows are markets for the exploitation of trafficked persons. We cannot ignore the direct
relationship between cable satellite TVs and pornography and the role they play in facilitating
and motivating human trafficking tendencies on both sides of traffickers and victims.

2.5.5 Online dating sites

In September 2014 the BBC reported that: Some victims had initially responded to online
dating sites’; In addition, intelligence gathered by the National Crime Agency (2011) has

18
highlighted the use of online dating to recruit trafficked persons (Mendel & Sharapov, 2016).
Internet dating websites are used for HT especially in the recruitment of the trafficked victims
(Hughes, 2014). Trafficked victims search either for job, love or a migration route to abroad
on platforms such as a dating website, a chat room, and forum. This proves the vulnerability
of victims who become visible to a trafficker and provides the trafficker with the space,
behind the invisible cloak of the internet to make attractive promises to the needy.

2.5.6 Dark-web and Applications

The Dark Web refers to World Wide Web content that exists on the Dark Net (L'huillier, et
al., 2011). In dark web identities, encryption tools and the content is not referenced by
general search indexes like Google or yahoo do (Chaabane, et al., 2010). Dark Web is fertile
ground for the facilitation of human trafficking because the perpetrators and the details of
their transactions remain anonymous to the law enforcement agencies. Not only that but also
Dark web facilitates the traffickers to obtain fraudulent identity documents that are crucial to
transferring trafficked persons to buyers.

Apps in dark net allow perpetrators of human trafficking to engage with quick and flexible
ways to recruit and monitor trafficked persons (Latonero, 2012) without being identified.
What to bear in mind is that Apps are not a stand-alone technology rather they are software
facilitating the use of other technologies. A good example here is Instagram; it is a mobile
social networking service for the sharing of photos and videos (Araújo, et al., 2014).
Instagram is commonly used via its app, and has been used by perpetrators of human
trafficking to persuade and recruit trafficked persons. Skype is another example of a
technology commonly used via its app that is considered a convenient method in the
recruitment and trafficking of people (Suerdem, &Oztaysi, 2016).

2.6 ICT based strategies to eradicate human trafficking

Technology can be used to detriment traffickers from using social media, websites, and
anonymizing apps and networks to contact and recruit their victims. Technological
advancements also provide unprecedented opportunities for law enforcement and service
providers to monitor illicit activity, locate and rescue victims, collect and analyze data
leading to the prosecution of traffickers in the following ways:

19
2.6.1 Training law enforcement officials to identify and respond to cases of HT

Article 27(3) of the Transnational Organized Crime Convention calls upon States to
endeavour to conduct law enforcement cooperation in order to respond to transnational
organized crime committed through the use of modern technology. Article 10, paragraph 2, of
the Trafficking in Persons Protocol adopted in 2000 declares that states parties shall provide
or strengthen training for law enforcement, immigration and other relevant officials in the
prevention of trafficking in persons (Laczko, et al., 2003).

UNODC (2018) stipulates that training should focus on methods used in preventing
trafficking, prosecuting the traffickers and protecting the rights of the victims. Law
enforcement agencies need to apply specialised software for handling information regarding
criminal acts, criminals and victims (Dixon, 2013) as far as human trafficking is concerned.
To better fight against HT there is a need to create a national databasefor law enforcements to
enter, access, and share pertinent information on human trafficking. This will enable law
enforcement organs to effectively identify, investigate and respond to cases of human
trafficking in Rwanda.

2.6.2 E-learning training programmes to raise awareness

Online training courses should be given different stakeholders like public, private and
voluntary sectors in order to raise awareness on human trafficking. They also equip
professionals and the public with the skills to identify and report human trafficking cases
(Watson, et al., 2016). Technology-focused training programs can serve as vital methods to
prevent trafficking that gained momentum due to the advancement in technology. These e-
learning training programs may include indicators or signs and behaviour that may indicate
HT on social networks. They also thorough knowledge to the trainee on what trafficking in
persons involves, its relevant definitions, types, possible locations of trafficked persons, false
promises of the traffickers and all their tricks(Kangaspunta, 2003).

2.6.3 Facial reconstruction technologies in human trafficking cases

Facial reconstruction technology relates near-photo quality images, which the police may use
to collect the information and description provided by the trafficked person and builds a
composite of a suspect that is later used to digitally search other photo databases (Osterburg
& Ward, 2013). This will enable RNP to connect with databases to other agency databases to

20
ensure that the search is international since HT is a transnational crime. Another technology
as pointed by Prentky, et al (2010) is Microsoft’s Photo DNA, which aids in identifying
images of children who are sexually exploited online and monitoring illicit online ads more
manageable for law enforcement. According to Mitchell, et al (2007) the CyberTipline is
another merging technology which provides the public and electronic service providers
(ESPs), with the ability to report instances of online enticement of children for sexual acts
and child exploitation material

2.6.4 Alerting people the risks associated with the use of technology

People and local leadership have to be forewarned on being aware of the different forms of
human trafficking and the risks associated with IT. People should also advance the (be Alert)
campaign through social media, radio, televisions, print materials, community meetings and
school clubs so as tell people the reality behind technology and human trafficking (IOM,
2012). There is a need to give more explanations to the general public on the usage of mobile
based apps and social network platforms commonly used by the youth (e.g. Facebook,
Instagram). They should be alerted on specified contacts that are from traffickers and ways
forward for hot line response to report concerns and suspicious contacts and enticements. The
government should also create a platform for survivor leaders, recent survivors, and service
providers to communicate and share information.

2.6.5 Financial tracking

In the definition given by Bernard et al (2011) financial tracking refers to the ability of
financial institutions, regulatory agencies and governmental authorities to monitor the
financial transactions, conducted by individuals and organizations, in order to identify and
disrupt possible criminal activity underlying the transactions. Financial tracking would enable
the responsible authorities to discover the flow of illicit funds and link it to incidences of HT
and the people involved (Simser, 2012). Traffickers use financial services to pay people
providing transportation services to move money across borders through prepaid cards and to
distribute the profits among gang leaders using individual bank accounts.

2.7 Conclusion

Technology is not a cause of human trafficking by itself, but like so many factors it can
contribute to the conduct of human trafficking. Technological solutions facilitate

21
communication and easy travel, all key ingredients of the business to ordinary people and to
the traffickers in general. At first instance, it should be highlighted that many of the
applications and software discussed in the previous chapter all work together with hardware
like mobile phones, desktops and televisions to facilitate human trafficking and thus should
not be treated in isolation from one another.

CHAPTER III: RESEARCH METHODOLOGY

3.1 Introduction

Research methodology refers to the procedures by which researchers go through to


accomplish their work of describing, explaining, and predicting phenomena (Kothari 2004).
The aim of research methodology according to Rajasekar et al., (2013)is to give the work
plan of research. This chapter examines and justifies the research design, population and area
22
of the study, sampling strategy, sample size and data collection methods. It also discusses
data collection instruments, data quality control, ethical considerations and data analysis
procedures.

3.2 Research design

According to Peter and Okenyi (2006), a research design is a plan or a blueprint which shows
how data required for the solution of a problem that the researcher is studying will be
collected and analyzed. The purpose of a research design is to provide a picture of a situation
as it naturally happens (Burns & Grove, 2007).The present study used exploratory research
design where by both qualitative and quantitative approaches were referred to. Quantitative
approach is used to generate numerical data to ensure high levels of reliability of gathered
data, and qualitative method to generate non-numerical data in order to get in-depth
information about the variables.

3.2.1 Qualitative approach

According to Wyse (2011) qualitative data collection methods vary using unstructured or
semi-structured techniques. In the views of Maxwell (2012) qualitative research is used to
gain a perceptive of underlying reasons, opinions, and motivations. It provides insight into
the problem or helps to develop ideas or hypotheses for potential quantitative research.
Qualitative Research is also used to uncover trends in thought and opinions, and dive deeper
into the problem. In the present study we focused on individual interview with the law
enforcement officials and the victims of human trafficking.

3.2.2. Quantitative approach

According to Kothari (2004) quantitative research is used to solve the problem under study
by generating numerical data or data that can be transformed into useable statistics. Similarly,
Wyse (2011) argued that this is used to calculate attitudes, opinions, behaviors, and other
defined variables and generalize results from a larger sample population. In quantitative
research, measurable data are used to formulate facts and uncover patterns in research. Sue &
Ritter (2011) pointed out that quantitative data collection methods are much more structured
than qualitative data collection methods, in the present study questionnaire was used to gain
quantitative data from the ordinary residents of Gasabo district.

23
3.3 Study Population

Krejcie and Morgan (2003) point out that study population is an aggregate or totality of all
the objects, subjects or members that conform to a set of specifications. Similarly, Zina
(2004) refers to population as the total membership of a distinct class of people, objects or
events that fit within the specific set specifications of the study. Gall et al (2006) added that
population is a set of people or items with similar characteristics that a study intends to study
and to draw statistical inferences or conclusions. It is for this reason that the population
considered to be of study here is composed by thirteen (16) law enforcement officials in joint
operation center, fifteen (15) victims of human trafficking and fifty thousand (50000)
inhabitants of Gasabo district.

3.4 Sampling strategies and sample size determination

Kothari (2004) pointed out that researcher should select smaller cases from bigger groups in
order to limit annotations to manageable subsets. Therefore, notwithstanding the fact that a
sample is small, it is a representative subset of the population (Trochim, 2006). This
conforms to what has been said by Mugo (2002) that a sample can be defined as a set of
respondents selected from a large population for the purpose of a survey. Purposive sampling,
convenience sampling and snowball sampling techniques were used.

3.4.1. Purposive sampling

In the view of Guarte, et al. (2006) purposive sampling technique is generally used to
generate a greater understanding of the subject being studied. Lemeshow (2013) pointed out
that purposive sampling technique is a non-probability procedure which is used to
deliberately decide on the units of analysis. Purposive sampling technique was used in this
study to access 13 law enforcement officials so as to conduct an interview on matters of
advancement in technology and their influence on human trafficking in Gasabo district. The
total sample size was determined by using both Morgan sample size formula and the formula
by Yaman (2000) as it is stated below from which 90% confidence level and 0.10 precision
were thought of. Sample size of 13 law enforcement officials at the district joint operation
was determined as follows.

24
N 16 16
Law enforcement official:n= = = =13
1+ n ( 0.10 ) 2 1+16 ( 0.10 ) 2 1.16
n: Stands for sample size
N:stands for population
N 50000 50000
Residents:n= = = =95 e: Stands for the level of
1+ n ( 0.10 ) 2 1+50000 ( 0.10 ) 2 50.000 precision (0.10)
0.10 stands for errors

3.4.2. Convenience sampling

According to Bhattacherjee (2012) convenience sampling technique is used in exploratory


research where the researcher is interested in getting an inexpensive approximation of the
truth. As the name implies, the sample is selected because it is convenient. According to
Castillo (2009) convenient sampling is a specific type of non-probability sampling method that
relies on data collection from population members who are conveniently available to
participate in the study. The researcher used this technique to identify residents of Gasabo
district who in their daily life use technological tools like mobile phones, desk tops and laptops
to access to social networks and platforms. To get the consent of the respondents the researcher
went in the localities where many people used to gather in market places and tax parks and he
gave questionnaire to whoever accepted that she/he use IT tools and has access to social media
platforms after asking them whether they want to cooperate.

3.4.3. Snowball sampling technique

Snowball sampling is defined by Arsovska (2012) as a special non probability method used
when the desired sample characteristic is rare. It may be extremely difficult or cost
prohibitive to locate respondents in these situations. The informants work also requires high
confidentiality and it is not easy to find them. The researcher used snowball sampling
technique to find human trafficking victims. Since it is rare to find these people one victim
from their association directed the researcher to other victims one by one until he got 15
victims. The researcher only found 15 victims and selected all of them for interview.

Table 3.2: Recapitulative table of research population, sample size, sampling techniques
and research instruments

25
respondents Populatio Sample Sampling
categories n size method Research instrument
Law
enforcement
officials
(JOC) 16 13 Purposive Interview
Victims of
human 15 Snowball Interview
trafficking 15
Ordinary
residents of
Gasabo
ditrict 50000 95 Convenience Questionnaire
Source: Field data, 2019

3.5 Procedures of data collection

In order to be introduced to the respondents and conduct research, the researcher got both an
introductory letter from College of Arts and Social Sciences (CASS) and an authorization
letter from the office of Inspector General of Police. These letters helped the researcher to
introduce himself to the concerned respondents and provide the relevant information.

3.6 Data collection methods and instruments

There are basically, two types of data collection methods namely primary and secondary.
Depending on the type of the research, the researcher can apply one of them or both. But the
researcher used primary data techniques in this study.

3.6.1. Primary data collection

Primary data are defined by Merriam &Tisdell (2015) as those which are collected afresh,
and for the first time, and thus happen to be original in nature. For the present study, this
method was applied to obtain first-hand information from the field where the researcher used
research instruments namely structured questionnaire and qualitative interview guide.
Questionnaires are easy for respondents to fill in a short period of time especially when the
respondents are many to fit the interview, for the sake of the present study questionnaires
were administered to 95 inhabitants of Gasabo district. The researcher also conducted an
interview with 13 law enforcement officials and 15 victims of human trafficking.

26
3.7 Data quality control

In data quality control the researcher ensures that the data collected is consistent with a single
data set and within a collection of data sets (Shuttle & worth, 2008). Furthermore, the
researcher controls the quality of the data collected to ensure that errors in the data are
cleared to the user who is able to test its appropriateness. For this research to be valuable to
the general public, the researcher ensured both validity and reliability of the research
instruments.

In its purest sense, validity refers to how well a scientific test or piece of research actually
measures what it sets out to, or how well it reflects the reality it claims to represent (Amin,
2005). Validity is the extent to which a measurement method appears “on its face” to measure
the construct of interest (Katamba& Nsubuga ,2010). To ensure the validity of the
questionnaire the researcher consulted supervisor as experts to confirm validity of items in
the questionnaires to measure what they are intended for, so as to minimize the errors.

Reliability is a way of assessing the quality of the measurement procedure used to collect
data in a dissertation (Amin, 2005). In order for the results from a study to be considered
valid, the measurement procedure must first be reliable. In order to ensure that data collection
instruments are reliable, a pilot study was conducted to people with the same characteristics
as the potential respondents who were supposed to participate in this study. Pilot study as
defined by Teijlingen and Hundley (2002) is a specific pre-testing of a particular instrument
such as questionnaire or interview schedule.

3.8 Ethical considerations

Ruzek, et al (2000) defined ethical considerations as an accumulation of values and principles


that address questions of what is good or bad in human affairs. While conducting this study,
the researcher observed and respected various ethical considerations such as being honest
with the respondents, being objective, open, and confident with them. He also observed social
responsibility, non-discrimination, and observance of the subjects’ rights, etc. Before starting
with the data collection procedure, the researcher discussed with various groups of
respondents and explained to them the purpose of the research. Confidentiality in the present
research was highly observed. For example, the names of the respondents were not revealed
anywhere during and after conducting this study.

27
3.9 Data analysis

After collection, data needs to be analyzed so that it is transformed into meaningful evidence,
data analysis is critical in that it provides valuable insights and answers to the questions
asked. According to Onwuegbuzie & Teddlie (2003) data analysis is dependent on obtaining
large and consolidated amounts of data that need to be interpreted. To analyze Data, the
researcher took into consideration the research questions and objectives of the study. The data
collected from questionnaires and interviews were quantitatively and qualitatively analyzed
and interpreted. Therefore, the results from questionnaires were presented in form of tables
and charts displaying frequency counts and percentages, where necessary, after recording,
coding, and organizing useful data.

3.10 Conclusion

To recapitulate, this chapter is all about research methodology used by the researcher in
order to carry out the study as well as to attain its objectives. It further portrays the target
population with which various methods of sampling were used in order to find the sample
size. Moreover, in this chapter, the researcher explained how data were collected through
interview and questionnaire by ensuring its validity andreliability. In this regard, the analysis
of data was done by using SPSS and office excel that helped the researcher to make the
research work more scientific and reliable. Findings will be analyzed and presented in the
following chapter.

28
CHAPTER III: RESEARCH METHODOLOGY

3.1 Introduction

Research methodology refers to the procedures by which researchers go through to


accomplish their work of describing, explaining, and predicting phenomena (Kothari 2004).
The aim of research methodology according to Rajasekar et al., (2013)is to give the work
plan of research. This chapter examines and justifies the research design, population and area
of the study, sampling strategy, sample size and data collection methods. It also discusses
data collection instruments, data quality control, ethical considerations and data analysis
procedures.

3.2 Research design

According to Peter and Okenyi (2006), a research design is a plan or a blueprint which shows
how data required for the solution of a problem that the researcher is studying will be
collected and analyzed. The purpose of a research design is to provide a picture of a situation
as it naturally happens (Burns & Grove, 2007).The present study used exploratory research
design where by both qualitative and quantitative approaches were referred to. Quantitative
approach is used to generate numerical data to ensure high levels of reliability of gathered
data, and qualitative method to generate non-numerical data in order to get in-depth
information about the variables.

3.2.1. Qualitative approach

According to Wyse (2011) qualitative data collection methods vary using unstructured or
semi-structured techniques. In the views of Maxwell (2012) qualitative research is used to
gain a perceptive of underlying reasons, opinions, and motivations. It provides insight into
the problem or helps to develop ideas or hypotheses for potential quantitative research.
Qualitative Research is also used to uncover trends in thought and opinions, and dive deeper
into the problem. In the present study we focused on individual interview with the law
enforcement officials and the victims of human trafficking.

29
3.2.2. Quantitative approach

According to Kothari (2004) quantitative research is used to solve the problem under study
by generating numerical data or data that can be transformed into useable statistics. Similarly,
Wyse (2011) argued that this is used to calculate attitudes, opinions, behaviors, and other
defined variables and generalize results from a larger sample population. In quantitative
research, measurable data are used to formulate facts and uncover patterns in research. Sue &
Ritter (2011) pointed out that quantitative data collection methods are much more structured
than qualitative data collection methods, in the present study questionnaire was used to gain
quantitative data from the ordinary residents of Gasabo district.

3.3 Study Population

Krejcie and Morgan (2003) point out that study population is an aggregate or totality of all
the objects, subjects or members that conform to a set of specifications. Similarly, Zina
(2004) refers to population as the total membership of a distinct class of people, objects or
events that fit within the specific set specifications of the study. Gall et al (2006) added that
population is a set of people or items with similar characteristics that a study intends to study
and to draw statistical inferences or conclusions. It is for this reason that the population
considered to be of study here is composed by thirteen (16) law enforcement officials in joint
operation center, fifteen (15) victims of human trafficking and fifty thousand (50000)
inhabitants of Gasabo district.

3.4 Sampling strategies and sample size determination

Kothari (2004) pointed out that researcher should select smaller cases from bigger groups in
order to limit annotations to manageable subsets. Therefore, notwithstanding the fact that a
sample is small, it is a representative subset of the population (Trochim, 2006). This
conforms to what has been said by Mugo (2002) that a sample can be defined as a set of
respondents selected from a large population for the purpose of a survey. Purposive sampling,
convenience sampling and snowball sampling techniques were used.

3.4.1. Purposive sampling

In the view of Guarte, et al. (2006) purposive sampling technique is generally used to
generate a greater understanding of the subject being studied. Lemeshow (2013) pointed out

30
that purposive sampling technique is a non-probability procedure which is used to
deliberately decide on the units of analysis. Purposive sampling technique was used in this
study to access 13 law enforcement officials so as to conduct an interview on matters of
advancement in technology and their influence on human trafficking in Gasabo district. The
total sample size was determined by using both Morgan sample size formula and the formula
by Yaman (2000) as it is stated below from which 90% confidence level and 0.10 precision
were thought of. Sample size of 13 law enforcement officials at the district joint operation
was determined as follows.

N 16 16
Law enforcement official:n= = = =13
1+ n ( 0.10 ) 2 1+16 ( 0.10 ) 2 1.16
n: Stands for sample size
N:stands for population
N 50000 50000
Residents:n= = = =95 e: Stands for the level of
1+ n ( 0.10 ) 2 1+50000 ( 0.10 ) 2 50.000 precision (0.10)
0.10 stands for errors
3.4.2. Convenience sampling

According to Bhattacherjee (2012) convenience sampling technique is used in exploratory


research where the researcher is interested in getting an inexpensive approximation of the
truth. As the name implies, the sample is selected because it is convenient. According to
Castillo (2009) convenient sampling is a specific type of non-probability sampling method that
relies on data collection from population members who are conveniently available to
participate in the study. The researcher used this technique to identify residents of Gasabo
district who in their daily life use technological tools like mobile phones, desk tops and laptops
to access to social networks and platforms., The researcher gave questionnaire to whoever
accepted that she/he use IT tools and has access to social media platforms.

3.4.3. Snowball sampling technique

Snowball sampling is defined by Arsovska (2012) as a special non probability method used
when the desired sample characteristic is rare. It may be extremely difficult or cost
prohibitive to locate respondents in these situations. The informants work also requires high
confidentiality and it is not easy to find them. The researcher used snowball sampling
technique to find human trafficking victims. Since it is rare to find these people one victim

31
from their association directed the researcher to other victims one by one until he got 15
victims. The researcher only found 15 victims and selected all of them for interview.

Table 3.2: Recapitulative table of research population, sample size, sampling techniques
and research instruments 42

respondents Populatio Sample Sampling


categories n size method Research instrument
Law
enforcement
officials
(JOC) 16 13 Purposive Interview
Victims of
human 15 Snowball Interview
trafficking 15
Ordinary
residents of
Gasabo
district 50000 95 Convenience Questionnaire
Source: Field data, 2019

3.5 Procedures of data collection


In order to be introduced to the respondents and conduct research, the researcher got both an
introductory letter from College of Arts and Social Sciences (CASS) and an authorization
letter from the office of Inspector General of Police. These letters helped the researcher to
introduce himself to the concerned respondents and provide the relevant information.

3.6 Data collection methods and instruments

There are basically, two types of data collection methods namely primary and secondary.
Depending on the type of the research, the researcher can apply one of them or both. But the
researcher used primary data techniques in this study.

3.6.1. Primary data collection

Primary data are defined by Merriam &Tisdell (2015) as those which are collected afresh,
and for the first time, and thus happen to be original in nature. For the present study, this
method was applied to obtain first-hand information from the field where the researcher used
research instruments namely structured questionnaire and qualitative interview guide.
Questionnaires are easy for respondents to fill in a short period of time especially when the
respondents are many to fit the interview, for the sake of the present study questionnaires

32
were administered to 95 inhabitants of Gasabo district. The researcher also conducted an
interview with 13 law enforcement officials and 15 victims of human trafficking.

3.7 Data quality control

In data quality control the researcher ensures that the data collected is consistent with a single
data set and within a collection of data sets (Shuttle & worth, 2008). Furthermore, the
researcher controls the quality of the data collected to ensure that errors in the data are
cleared to the user who is able to test its appropriateness. For this research to be valuable to
the general public, the researcher ensured both validity and reliability of the research
instruments.

In its purest sense, validity refers to how well a scientific test or piece of research actually
measures what it sets out to, or how well it reflects the reality it claims to represent (Amin,
2005). Validity is the extent to which a measurement method appears “on its face” to measure
the construct of interest (Katamba& Nsubuga ,2010). To ensure the validity of the
questionnaire the researcher consulted supervisor as experts to confirm validity of items in
the questionnaires to measure what they are intended for, so as to minimize the errors.

Reliability is a way of assessing the quality of the measurement procedure used to collect
data in a dissertation (Amin, 2005). In order for the results from a study to be considered
valid, the measurement procedure must first be reliable. In order to ensure that data collection
instruments are reliable, a pilot study was conducted to people with the same characteristics
as the potential respondents who were supposed to participate in this study. Pilot study as
defined by Teijlingen and Hundley (2002) is a specific pre-testing of a particular instrument
such as questionnaire or interview schedule

3.8 Ethical considerations

Ruzek, et al (2000) defined ethical considerations as an accumulation of values and principles


that address questions of what is good or bad in human affairs. While conducting this study,
the researcher observed and respected various ethical considerations such as being honest
with the respondents, being objective, open, and confident with them. He also observed social
responsibility, non-discrimination, and observance of the subjects’ rights, etc. Before starting
with the data collection procedure, the researcher discussed with various groups of
respondents and explained to them the purpose of the research. Confidentiality in the present

33
research was highly observed. For example, the names of the respondents were not revealed
anywhere during and after conducting this study.

3.9 Data analysis

After collection, data needs to be analyzed so that it is transformed into meaningful evidence,
data analysis is critical in that it provides valuable insights and answers to the questions
asked. According to Onwuegbuzie & Teddlie (2003) data analysis is dependent on obtaining
large and consolidated amounts of data that need to be interpreted. To analyze Data, the
researcher took into consideration the research questions and objectives of the study. The data
collected from questionnaires and interviews were quantitatively and qualitatively analyzed
and interpreted. Therefore, the results from questionnaires were presented in form of tables
and charts displaying frequency counts and percentages, where necessary, after recording,
coding, and organizing useful data.

3.10 Conclusion

To recapitulate, this chapter is all about research methodology used by the researcher in
order to carry out the study as well as to attain its objectives. It further portrays the target
population with which various methods of sampling were used in order to find the sample
size. Moreover, in this chapter, the researcher explained how data were collected through
interview and questionnaire by ensuring its validity andreliability. In this regard, the analysis
of data was done by using SPSS and office excel that helped the researcher to make the
research work more scientific and reliable. Findings will be analyzed and presented in the
following chapter.

34
CHAPTER FOUR: PRESENTATION, ANALYSIS, AND INTERPRETATION OF
THE FINDINGS

4.1 Introduction

The present chapter discusses the results obtained through primary data collected from
respondents by using data collection instruments namely questionnaire and interview guide.
Basing on those tools, analysis and interpretation were made purposely to find out answers to
the research questions. In this study, the overall objective was to assess the impact of
information technology on human trafficking in Rwanda. To successfully attain the main
objective, specific ones have been set and they included examining the potential causes of
human trafficking, investigating into the main technological tools used to facilitate human
trafficking, finding out the influence of technology based factors on human trafficking and
suggesting the way forward to the human trafficking vice. Different views from different
respondents were analysed in relation to the pre-determined objectives of this study.

4.2 Background characteristics of the respondents

In this study, the total population was 50,031 from which 123 respondents were drawn as a
sample. Questionnaires were administered to 95 ordinary citizens of Gasabo district. To get
the supportive information the researcher held an interview with the victims of human
trafficking and the law enforcement officials working at joint operation centre.

4.2.1 Gender of respondents

In every study gender perspectives should be considered paramount. This is because it raises
unbiased views from both sexes. To ensure that there is no gender bias in this study, the
researcher selected respondents from both men and women.

35
Figure: 4.1: Respondents‟ gender/sex group

Male Female

40 42%
55
58%

Source: Field data August, 2019

The above figure is about gender of the respondents who participated in this study. The total
number of ordinary residents of Gasabo district were 95 of which 55 (58%) were female and
40 (42%) were male. Therefore, females were more than male on the side of ordinary
residents. Law enforcement officials were mostly men since among 13 respondents 10 were
men while on the side of the victims of human trafficking 11 were females meaning that only
4 were males.

4.2.2 Education level of the respondents

Education is one of the most important characteristics that might affect the person’s attitudes
and the way of understanding any particular social phenomenon. In a way, the response of an
individual is likely to be determined by his educational status and therefore it becomes
imperative to know the educational background of the respondents. Hence the variable
“Educational level‟ was investigated by the researcher and the data pertaining to education is
presented in figure 4.2 below:

Figure 4.2: Respondents level of education

36
36
40
35 29
30
25 18
20 12
15
10
5
0

on 2) 0) ve
cati n(
A
el(
A
ab
o
u io v
ed ca
t le and
y u n ee
ar ed atio gr
rim
P ar
y uc sd
e
nd ed er
co ty as
t
S e ersi M
v
ni
U

Source: Field data, 2019

Basing on the above figure the data shows that most of the participants to this study have
attended secondary school and this is illustrated by the green bar of 36 (37.9%). On the other
side, 29 (30.5%) respondents attended university education level whereas 18 (18.9%)
attended primary education level. It looks like the highly educated persons who participated
in the present study were only 12 (12.6%). These data conform to the interview data which
indicated that all the law enforcement representatives who participated in the present study
were educated to university level and above whereas 5 of the victims of human trafficking
attended primary education level, 8 held A2 secondary school certificate and only two (2)
were university graduates.

4.2.3 Respondents age group

Age of the respondents is one of the most important characteristics in understanding their
views about the particular problems; by and large age indicates level of maturity of
individuals in that sense age becomes more important to examine the responses based on age
of the respondents. Table 4.1 shows the distribution of respondents‟ age.

Table 4.1: Distribution of respondents by their age group48

37
Cumulative
Frequency Percent Valid Percent Percent
Valid Below 20 years 40 42.1 42.1 42.1
31years-40years 50 52.6 52.6 94.7
41years and above 5 5.3 5.3 100.0
Total 95 100.0 100.0

Source: Field data, August 2019

The results in the table above reveal that the big number of respondents who participated in
the present study were mature enough to give the responses that are reliable especially for
studies like this one. For instance 50 (52.6% were aged between 31 and 40 years of age.
Though 40 (42.1%) respondents were in the generation of youngsters, the study also involved
the views of the old age people who among 95 respondents were 5 (5.3%). In the interview
with law enforcement officials almost all of them were aged above 31 years except only one
individual who was aged 28 years. On the other side the respondents were mostly youth; for
instance 8 were aged below 31 years whereas 3 were aged below 21 years and other 3 were
aged above 31 years. This shows that the study involved both age range meaning that it is not
biased a far as the age is concerned.

4.2.4: Respondents marital status

Knowing that marital status of participants in the study is critical in order to test the
variability of understanding of the topic under study, the researcher requested the participants
to mention their marital status. The good thing is that all marital status categorizations
participated in this study as portrayed in the following figure.

Figure 4.3: Respondents’ marital status 91

38
45
40
35
30
25 45
20
15 24
10
11
8 7
5
0
Single Married Divorced Widow Widower

Source: Field data August, 2019

The views of respondents in the above figure show that 45 (60%) of respondents were single
persons this means. Furthermore the study revealed that 24 (25.2%) respondents who
participated in the present study were divorced persons while 11 (11.6%) were married
people, widows and widowers make the total of 15 (15.8%) of the respondents. In the
interview with the victims of human trafficking it was so discovered that 9 were single 2 were
divorced, 2 were married while 2 were widowers. On the side of law enforcement officials
only three were singles while the remaining 10 individuals tallied were married persons. This
indicates that this study did not contain any bias as far as marital is concerned.

4.3 Views on the causes of human trafficking

The researcher asked the participants to raise the main causes of human trafficking so as to
link them with the available technological advancements. The answers given were presented
and discussed in the following table.

Table 4.2: Respondents views on the causes of human trafficking 50

39
Cumulative
Frequency Percent Valid Percent Percent
Valid Poverty 22 23.2 23.2 23.2
Armed conflicts/ disasters
14 14.7 14.7 37.9
and Political instability
Globalization and global
19 20.0 20.0 57.9
demand for cheap labour
Organized criminal
syndicates and human 15 15.8 15.8 73.7
trafficking
Corruption, political
instabilities and human 15 15.8 15.8 89.5
trafficking
Growth of global
10 10.5 10.5 100.0
commercial sex market
Total 95 100.0 100.0
Source: Field data August, 2019

From the above table the respondents argue that poverty is the potential cause of human
trafficking in cooperation with technology. Of all respondents, 22 (23.2%) of them pointed at
poverty as the potential cause of human trafficking; furthermore 19 (20.0%) believed that
globalization and global demand for cheap labour accelerates human trafficking among other
causes. The variable of organized criminal syndicates was mentioned by 15 (15.8%) as for
corruption political instabilities. Additionally, armed conflicts and disasters were chosen by
14 (23.2%) as well as growth of global commercial sex market. These six causes of human
trafficking were also mentioned by the victims of human trafficking during the interview
though many of them said that they were trafficked after being promised for better life
abroad. As for the law enforcement officials, 8 pointed at globalization and global demand
for cheap labour among the main reason why human trafficking is increasing.

4.4 Respondents general views on human trafficking


40
To be sure that the respondent who participated in the present study had the required and
relevant knowledge to the present study, they were asked to mention whether they know what
human trafficking is, its forms and types mostly influenced by technology.

4.4.1 Views on the definition of human trafficking

Figure 4.4: Respondents knowledge on the definition of human trafficking 51

95
85
75
65 91
55
45
35
25
15 4
5
Yes No
Series1 91 4

Source: Field data, August, 2019

The figure above describes the respondents’ views on their knowledge to human trafficking;
it was visible that 91 (95.8%) respondents who participated in the present study knew what
human trafficking means. Even though 4 (4.2%) said that they didn’t know what human
trafficking means, all interviewed respondents being human trafficking victims and law
enforcement officials had knowledge on human trafficking. This indicates that the study was
carried out on people who knew what human trafficking really is.

41
4.4.2 Views on types of human trafficking

The respondent’s views on the types of human trafficking were presented in the following
figure as follows:

Figure 4.5: Respondents views on thetypes of human trafficking existing in Rwanda

32.5
27.5
33
22.5
17.5 25
12.5 18 19
7.5
2.5
Sex traffick- Labor traf- Debt bond- Involuntary
ing ficking age domestic
servitude

Series1 25 33 18 19

Source: Field data, August, 2019

The figure above shows the views of respondents on the main types of human trafficking that
are most prevailing in Rwanda. The study revealed that labour trafficking is the main type of
human trafficking as pointed out by 33 (34.7%) respondents among others. Even though 25
(26.3%)respondents pointed at sex trafficking, other 19 (20%) of the respondents pointed at
involuntary domestic servitude among other types of human trafficking. It never ended there
only 18 (18.9%) respondents added that debt bondage is among other types of human
trafficking. In the interview with the victims of human trafficking 10 of them said that they
were trafficked into sexual activities whereas other 5 victims urged that they were trafficked
for forced labour.

42
4.4.3 Views on the main forms of human trafficking

The respondents’ views on the main forms of human trafficking were presented and
discussed as follows:

Table4.3: Respondents views on the forms of human trafficking influenced by technology


Cumulative
Frequency Percent Valid Percent Percent
Valid Child Labour 24 25.3 25.3 25.3
Child sex trafficking 30 31.6 31.6 56.8
Debt bondage 27 28.4 28.4 85.3
Involuntary domestic
14 14.7 14.7 100.0
servitude
Total 95 100.0 100.0

Source: Field data, August 2019

The above table describes findings on the main forms of human trafficking that are mostly
practiced in Rwanda child sex trafficking was put forward to the fastest place by 30 (31.6%)
respondents. Beside, debt bondage was marked by 27 (18.4%) of respondents as for 24
(15.3%) respondents child labour is among the dominant forms of human trafficking that
exists in Rwanda. The respondents also urged that one of the forms of human trafficking is
involuntary domestic servitude.

4.5 Technological tools that influence human trafficking

The researcher discussed with the respondents about the main technological tools that
facilitate human trafficking and the findings were discussed as follows:

Figure 4.6: Respondents views on the most technological tools influencing human trafficking

43
30
20 29
10 15 15 18
7 11
0

Source: Field data, August, 2019

From the above figure respondents were asked to point out the main tools through which
human traffickers and victims communicate and share for the ease of human trafficking. For
instance 29 (30.5%) respondents talks about mobile phones as the main tool under which they
communicate with the human traffickers. Video cameras and accompanying outputs were
mentioned by 15 (15.9%) as tools that ease human trafficking activities by the traffickers and
their collaborators in sharing photos of the victims and other 15 (15.9%) also talked much
about online dating sites among the technological tools that enables human trafficking.
Among 95 respondents 18 (18.9%) said that human trafficking is facilitated by the dark web
and applications in which people communicate anonymously. Television and the use of
laptops and desktops are among other technological tools that enable human trafficking to
take place so easily.

4.6 Views on tech strategies to fight against human trafficking

In the present study the researcher asked the respondents on the strategies to be adopted in
order to fight against human trafficking by using technology.

Table: 4.4: Respondents’ views on technological strategies to fight human trafficking 54

44
Strategies Cumulative
Frequency Percent Valid Percent Percent
Valid Training law enforcement
officials to identify and 25 26.3 26.3 26.3
respond to cases of HT
E-learning training
10 10.5 10.5 36.8
programs to raise awareness
Facial reconstruction
technologies in human 8 8.4 8.4 45.3
trafficking cases
Alerting people the risks
associated with the use of 30 31.6 31.6 76.8
technology
Financial tracking 22 23.2 23.2 100.0
Total 95 100.0 100.0

Source: Field data, August, 2019


The table above shows tech strategies to be adopted in order to fight against human
trafficking mostly favoured by technology. It is good to involve technology in fighting its
influence on human trafficking. For instance 25 (31.6%) respondents embarked on alerting
people on the risks associated with the use of technology as the best way to fight human
trafficking. Among 95 respondents, 25 (26.3%) argued that training law enforcement officials
to identify and respond to cases of human trafficking involving technology is one of the
strategies to eradicate human trafficking. Financial tracking was pointed at by 22 (23.2%)
among the strategies to fight against human trafficking. E-learning training programs to raise
awareness was pointed at by 10 (10.5%) respondents and using facial reconstruction
technologies in human trafficking was pointed at by 8 (8.4%) respondents among other
strategies to fight against human trafficking.

4.7 Conclusion

To sum up the above chapter discussed the findings retrieved in the questionnaires and those
information that were put forward during the interview, it was lucky that there was no
missing questionnaire and those who were supposed to be invited on the interview all
attended the interview. The data retrieved all provided answers to the research objectives.

45
CHAPTER V: SUMMARY OF FINDINGS AND RECOMMENDATIONS

5.1 Introduction

This study was conducted with overall objective to assess the impact of information
technology on human trafficking. The present chapter encompasses summary of findings,
recommendations, and suggestions for further studies.

5.2 Summary of the findings

The research findings were obtained through presentation, interpretation, and analysis of data
from the respondents by using research tools namely questionnaire and interview. Data from
Questionnaire were collected from 95 ordinary residents of Gasabo district. The data from the
interview were gathered from 13 law enforcement officials and 15 victims of human
trafficking. In this line, the data obtained from respondents were analysed and interpreted in
accordance with research objectives.

The first objective of this study was to see how technology influences human trafficking in its
forms and types. Findings revealed that really technology is part of the main factors that lead
to human trafficking. The respondents were asked to give views about what they thought to
be the real causes of human trafficking. . Out of 95 respondents, the majority of them
mentioned poverty, globalization and global demand as the main causes of human
trafficking. However, some of them added a new item whereby they said that the growth of
organized criminal syndicates as corruption with political instabilities should counted among
the main causes of human trafficking (Figure or Table). Findings on the main types of human
trafficking revealed that labour trafficking and involuntary domestic servitude should be seen
as the main types of human trafficking (Table or Figure). As for the findings on technological
tools that facilitate human trafficking, mobile phones and video cameras were thought by the
respondents to be the main technological tools that make human trafficking easier. Online
dating sites and dark web were among other soft tools that lead to human trafficking.

At the end of the study the researcher asked the respondents to put forward the main
technological strategies that can be adopted in order to fight against human trafficking
facilitated by technology. Among other strategies alerting people on the risks associated with

46
the use of technological tools has been pointed at by majority of the respondents. Training
law enforcement agencies was mentioned and tracking financial transactions of the criminals
were also thought to be the second leading strategies to fight against human trafficking
facilitated by technology. . Finally, the respondents urged that E-learning training programs
to raise awareness can be part of technological strategies that can be adopted in order to fight
against human trafficking. Actually human trafficking is detrimental to the society, and it is
worsened by the use of technology that eases the sharing of information through cheap and
easy communication. To be able to succeed in controlling human trafficking, the same
technology that can ease human trafficking should be employed to fight the vice of human
trafficking.

5.3 Recommendations

Human trafficking itself is detrimental to the social bonds of the community; this is because it
destructs social cohesion. Due to its negative impact, getting together of individual persons,
government institutions and non-government organizations in tackling human trafficking is
crucial. The researcher would wish to recommend the following stakeholders for each to take
part in tackling the issue of human trafficking mostly facilitated by technology.

5.3.1 Recommendations to Law enforcement agencies

Law enforcement agencies should adopt programs which aim at improving the control of
passports and movement from one country to another.

The legislators should enact laws that punish those who did not facilitate and support the
victims of human trafficking. This should be special to the parents and other guardians and
relatives.

5.3.2 Recommendations to the Government of Rwanda

It was seen that training law enforcement officials in human trafficking and technology is
paramount; therefore the government of Rwanda must introduce and amend training
programs to both law enforcement agencies and the public in general.

47
The Rwandan government in cooperation with Rwanda National Police should support
events, activities, and organizations aiming at sensitizing the general community about
human trafficking cases.

5.3.3 Recommendations to the Rwandan Community

People need not to involve themselves in any collaboration with the people who promise
them better life abroad.
The Rwandan community also should support those who are young to report the assault.
Parents of children should make sure that their children are not exposed to situations that may
throw them into the risks of being enticed to human trafficking.
Every one of the victims should know that human trafficking is a crime punishable under
Rwandan Penal code; therefore, they should report the assault to the law enforcements
because if they do not report the assault the assailants keep on attacking others.
Those victims whose families seem careless in facilitating the victims to report the assault to
the law enforcements, should themselves report on their own.

5.4 Suggested further studies

To those who will read this thesis and feel more interested in this field, their contribution
should focus on the following:
To examine the uniqueness of human trafficking compared to other criminal cases
To discuss technological challenges faced by the governments in fighting human trafficking
facilitated by technology
To examine the relationship between easy communication and human trafficking

48
REFERRENCE LIST

 Agbu, O. (2003). Corruption and human trafficking: The Nigerian case. West Africa
Review, 4(1), 1-13
 Agnew, R., Brezina, T., Wright, J. P., & Cullen, F. T. (2002). Strain, personality traits,
and delinquency: Extending general strain theory. Criminology, 40(1), 43-72
 Amin, A., Grunske, L., & Colman, A. (2013). An approach to software reliability
prediction based on time series
 amoxicillin-clavulanate, azithromycin, piperacillin-tazobactam, roxithromycin, ticarcillin,
ticarcillin-clavulanate,
 Apap, J., Cullen, P., &Medved, F. (2002, September). Counteracting human trafficking:
Protecting the victims of trafficking. In European Conference on Preventing and
Combating Trafficking in Human Beings: Global Challenge for the 21st Century,
Brussels: European Parliament (Vol. 18, p. 20).
 Araújo, C. S., Corrêa, L. P. D., da Silva, A. P. C., Prates, R. O., &Meira, W. (2014,
October). It is not just a picture: Revealing some user practices in Instagram. In 2014 9th
Latin American Web Congress (pp. 19-23). IEEE
 Aronowitz, A. A. (2009). Human trafficking, human misery: The global trade in human
beings. Greenwood Publishing Group
 Bernard, K., Cassidy, A., Clark, M., Liu, K., Lobaton, K., McNeill, D., & Brown, D.
(2011, April). Identifying and tracking online financial services through web mining and
latent semantic indexing. In 2011 IEEE Systems and Information Engineering Design
Symposium (pp. 158-163). IEEE
 Brignone, L., &Edleson, J. L. (2019). The Dating and Domestic Violence App Rubric:
Synthesizing Clinical Best Practices and Digital Health App Standards for Relationship
Violence Prevention Smartphone Apps. International Journal of Human–Computer
Interaction, 1-11.
 Chaabane, A., Manils, P., &Kaafar, M. A. (2010, September) digging into anonymous
traffic: A deep analysis of the tor anonymizing network. In 2010 Fourth International
Conference on Network and System Security (pp. 167-174). IEEE.
 Chaffee, T., & English, A. (2015). Sex trafficking of adolescents and young adults in the
United States: healthcare provider's role. Current opinion in obstetrics and
gynecology, 27(5), 339-344.

49
 Chapkis, W. (2005). Soft glove, punishing fist: the Trafficking Victims Protection Act of
2000. Regulating sex: The politics of intimacy and identity, 51-65.
 Chawki, M., &Wahab, M. (2005). Technology is a double-edged sword: Illegal human
trafficking in the information age. Computer Crime Research Center.
 Choo, K. K. R. (2008). Organised crime groups in cyberspace: a typology. Trends in
organized crime, 11(3), 270-295.
 Defeis, E. F. (2003). Protocol to Prevent, Suppress and Punish Trafficking in Persons-A
New Approach. ILSA J. Int'l & Comp. L., 10, 485.
 Derby, C. N. (2009). Contemporary slavery: researching child domestic servitude.
Lanham, MD: University Press of America.
 Di Nicola, A. (2013). 3 Researching into human trafficking: Issues and problems. In
Human trafficking (pp. 61-84). Willan.
 Dixon Jr, H. B. (2013). Human trafficking and the internet (and other technologies,
too). Judges J., 52, 36.
 Dobash, RE.; Dobash, R. Violence against wives: A case against the patriarchy. New
York: Free Press; 1979
 Durkin, K. F., & Bryant, C. D. (2001). “Log on to sex”: Some notes on the carnal
computer and erotic cyberspace as an emerging research frontier.
 Ehrenreich, B., Hochschild, A. R., & Kay, S. (Eds.). (2003). Global woman: Nannies,
maids, and sex workers in the new economy. Macmillan publisher
 empirical investigation. General hospital psychiatry, 22(1), 27-36.
 Farrell, A. (2008). Understanding and improving law enforcement responses to human
trafficking.
 Farrell, A., Owens, C., & McDevitt, J. (2014). New laws but few cases: Understanding
the challenges to the investigation and prosecution of human trafficking cases. Crime,
Law and Social Change, 61(2), 139-168.
 Fitzpatrick, J. (2002). Trafficking and a human rights violation: The complex intersection
of legal frameworks for conceptualizing and combating trafficking. Mich. J. Int'l L., 24,
1143.
 Harrison, Bryant. "Information and communication technology policy in Rwanda." Case
Study. Retrieved on December 20, no. 2014 (2005): 35-57.

50
 Hearn, J. (2006). The implications of information and communication technologies for
sexualities and sexualised violences: Contradictions of sexual citizenships. Political
Geography, 25(8), 944-963
 Holman, M. (2008). The Modern-Day Slave Trade: How the United States Should Alter
the Victims of Trafficking and Violence Protection Act in Order to Combat International
Sex Trafficking, More Effectively. Tex. Int'l LJ, 44, 99.
 Hsu, K. S. (2007). Masters and servants in America: The ineffectiveness of current
United States anti- trafficking policy in protecting victims of trafficking for the
purposes of domestic servitude. Geo. J. on Poverty L. &Pol'y, 14, 489.
 Hughes, D. M. (2000). The internet and sex industries: Partners in global sexual
exploitation. IEEE Technology and Society Magazine, 19(1), 35-42.
 Hughes, D. M. (2000). The" Natasha" trade: The transnational shadow market of
trafficking in women. Journal of international Affairs, 625-651
 Hughes, D. M. (2002). The use of new communications and information technologies for
sexual exploitation of women and children. Hastings Women's LJ, 13, 127.
 Hughes, D. M. (2014). Trafficking in human beings in the European Union: Gender,
sexual exploitation, and digital communication technologies. Sage Open, 4(4),
 Hultgren, M., Jennex, M. E., Persano, J., & Ornatowski, C. (2016, January). Using
knowledge management to assist in identifying human sex trafficking. In 2016 49th
Hawaii International Conference on System Sciences (HICSS) (pp. 4344-4353). IEEE
 Ibanez, M., & Suthers, D. D. (2014, January). Detection of domestic human trafficking
indicators and movement trends using content available on open internet sources. In 2014
47th Hawaii International Conference on System Sciences (pp. 1556-1565). IEEE
 Jones, L., Engstrom, D. W., Hilliard, T., & Diaz, M. (2007). Globalization and human
trafficking. J. Soc. & Soc. Welfare, 34, 107.
 Kabuye, R., & Mukasa, N. Developing a Course Outline to Enhance Research Skills at
Graduate School at Bugema
 Kangaspunta, K. (2003, December). Mapping the inhuman trade: Preliminary findings of
the database on trafficking in human beings. In Forum on crime and society (Vol. 3, No.
1, pp. 81-103). UN.
 Kara, S. (2011). Supply and demand: Human trafficking in the global economy. Harvard
International Review, 33(2), 66.

51
 Kligman, G., & Limoncelli, S. (2005). Trafficking women after socialism: From, to, and
through Eastern Europe. Social Politics: International Studies in Gender, State and
Society, 12(1), 118-140.
 Kozma, R. B., &Vota, W. S. (2014). ICT in developing countries: Policies,
implementation, and impact. In Handbook of research on educational communications
and technology(pp. 885-894). Springer, New York, NY.
 Laczko, Frank, and Marco A. Gramegna. "Developing better indicators of human
trafficking." The Brown Journal of world affairs 10, no. 1 (2003): 179-194.
 Lannon, J. (Ed.). (2012). Human Rights and Information Communication Technologies:
Trends and Consequences of Use: Trends and Consequences of Use. IGI Global.
 Latonero, M. (2011). Human trafficking online: The role of social networking sites and
online classifieds. Available at SSRN 2045851.
 Latonero, M. (2012). Technology and human trafficking: The rise of mobile and the
diffusion of technology-facilitated trafficking. Available at SSRN.
 L'huillier, G., Alvarez, H., Ríos, S. A., & Aguilera, F. (2011). Topic-based social network
analysis for virtual communities of interests in the dark web. ACM SIGKDD
Explorations Newsletter, 12(2), 66-73.
 Lieten, G. K. (2002). Child labour in India: disentangling essence and
solutions. Economic and political Weekly, 5190-5195.
 Longe, O., Ngwa, O., Wada, F., Mbarika, V., &Kvasny, L. (2009). Criminal uses of
information & communication technologies in sub-Saharan Africa: trends, concerns and
perspectives. Journal of Information Technology Impact, 9(3), 155-172.
 MacKinnon CA. Feminism, Marxism, method, and the state: An agenda for theory.
Feminist Theory. 1982; 7(3):515–544. MacKinnon, CA. Toward a feminist theory of the
state. Cambridge, MA: Harvard University Press; 1989.
 Martens, J., Pieczkowski, M., & van Vuuren-Smyth, B. (2003). Seduction, sale and
slavery: Trafficking in women & children for sexual exploitation in Southern Africa.
International Organization for Migration (IOM) Regional Office for Southern Africa.
 McGaha, J. E., & Evans, A. (2009). Where Are the Victims-The Credibility Gap in
Human Trafficking Research. Intercultural Hum. Rts. L. Rev., 4, 239.
 McLoughlin, Catherine. "What ICT-related skills and capabilities should be considered
central to the definition of digital literacy?." In EdMedia+ Innovate Learning, pp. 471-
475. Association for the Advancement of Computing in Education (AACE), 2011.

52
 Mendel, J., & Sharapov, K. (2016), human trafficking and online networks: Policy,
analysis, and ignorance. Antipode, 48(3), 665-684.
 Miko, f. t. (2006, july). Trafficking in persons: the us and international response. Library
of congress Washington dc congressional research service.
 Mitchell, K. J., Finkelhor, D., &Wolak, J. (2007). Online requests for sexual pictures
from youth: Risk factors and incident characteristics. Journal of Adolescent Health, 41(2),
196-203.
 modeling. Journal of Systems and Software, 86(7), 1923-1932.
 Mullings, B. (1999). Globalization, tourism, and the international sex trade. Sun, sex and
gold: tourism and sex work in the Caribbean. Oxford: Rowman & Littlefield, 55-81.
 Murray, A. (2000). Debt-bondage and trafficking; Don’t believe the hype (pp. 51-64).
New York, Routledge.
 Musto, J., Boyd, Z., Boyle, E., Bissel, A., Gibson, K., & Kim, J. (2012). The rise of
mobile and the diffusion of technology-facilitated trafficking (p. 43). Los Angeles, CA:
University of Southern California, Center on Communication Leadership & Policy.
 Noguchi, Y. (2002). ILO Convention No. 182 on the worst forms of child labour and the
Convention on the Rights of the Child. International Journal of Childrens Rights, 10, 355-
369.
 Nuth, M. S. (2008). Taking advantage of new technologies: For and against crime.
Computer Law & Security Review, 24(5), 437-446.
 Oakley MA, Addison SC, Piran N, Johnston GJ, Damianakis M, Curry J, et al. Weigeldt
A. Outcome study of brief relational-cultural therapy in a women's mental health center.
Psychotherapy Research: Journal of the Society for Psychotherapy Research. 2013;
23(2):137
 Obuah, E. (2006). Combating global trafficking in persons: The role of the United States
post-September 2001. International Politics, 43(2), 241-265.
 Onwuegbuzie, A. J., & Combs, J. P. (2011). Data analysis in mixed research: A primer.
 Osterburg, J. W., & Ward, R. H. (2013). Criminal investigation: A method for
reconstructing the past. Routledge
 Outshoorn, J. (2005). The political debates on prostitution and trafficking of
women. Social Politics: International Studies in Gender, State and Society, 12(1), 141-
155.
 p.87.

53
 Prentky, R., Burgess, A., Dowdell, E. B., Fedoroff, P., Malamuth, N., & Schuler, A.
(2010). A multi-prong approach to strengthening internet child safety: Final Report
submitted to the Office of Juvenile Justice and Delinquency Prevention, Office of Justice
Programs, US Department of Justice.
 Quayle, E., & Taylor, M. (2002). Child pornography and the Internet: Perpetuating a
cycle of abuse. Deviant Behavior, 23(4), 331-361.
 Quayle, E., & Taylor, M. (2002). Child pornography and the Internet: Perpetuating a
cycle of abuse. Deviant Behavior, 23(4), 331-361.
 Rahman, M. A. (2011). Human Trafficking in the era of Globalization: The case of
Trafficking in the Global Market Economy. Transcience Journal, 2(1), 54-71.
 Raymond, J. G. (2004). Prostitution on demand: Legalizing the buyers as sexual
consumers. Violence against women, 10(10), 1156-1186.
 Ruzek, J. I., & Zatzick, D. F. (2000). Ethical considerations in research participation
among acutely injured trauma survivors: An
 Savona, E., & Williams, P. (2012). The United Nations and transnational organized
crime. Routledge.#
 Schauer, E. J., & Wheaton, E. M. (2006). Sex trafficking into the United States: A
literature review. Criminal Justice Review, 31(2), 146-169.
 Sigmon, J. N. (2008). Combating modern-day slavery: Issues in identifying and assisting
victims of human trafficking worldwide. Victims and Offenders, 3(2-3), 245-257.
 Simser, J. (2012). Money laundering: emerging threats and trends. Journal of Money
Laundering Control, 16(1), 41-54
 Suerdem, A.&Oztaysi, B. (2016). Collaborative Requirement Prioritization for an E-
Recruitment Platform for Qualified but Disadvantaged Individuals. In Knowledge,
Information and Creativity Support Systems (pp. 547-556). Springer, Cham.
 susceptibility testing methods Results from multicenter trials. Diagnostic microbiology
and infectious disease, 24(2),
 systematic review of the literature. European journal of midwifery,
 Teijlingen, E.Hundley. (2020). Midwives’ views towards women using mHealth and
eHealth to self-monitor their pregnancy: A
 Thomas, K., McCoy, D., Grier, C., Kolcz, A., &Paxson, V. (2013). Trafficking
Fraudulent Accounts: The Role of the Underground Market in Twitter Spam and Abuse.
In Presented as part of the 22nd {USENIX} Security Symposium ({USENIX} Security
13) (pp. 195-210).

54
 trovafloxacin (CP 99,219), U-100592, and U-100766 for various National Committee for
Clinical Laboratory Standards
 Turner, J., & Kelly, L. (2008). Trade secrets: Intersections between Diasporas and crime
groups in the constitution of the human trafficking chain. The British Journal of
Criminology, 49(2), 184-201.
 University. Managing Change at Universities, 107.
 Van Reisen, M., Gerrima, Z., Ghilazghy, E., Kidane, S., Rijken, C., & Van Stam, G.
(2017). Tracing the emergence of ICT-enabled human trafficking for ransom. Handbook
for human trafficking. Routledge: London (forthcoming).
 Van Reisen, M., Gerrima, Z., Ghilazghy, E., Kidane, S., Rijken, C., & Van Stam, G.
(2017). Tracing the emergence of ICT-enabled human trafficking for ransom. Handbook
for human trafficking. Routledge: London (forthcoming).
 Viuhko, M., Jokinen, A., & Jokinen, A. (2009). Human trafficking and organised crime:
Trafficking for sexual exploitation and organised procuring in Finland (Vol. 62).
Helsinki: Heuni.
 Vowell, P. R., & May, D. C. (2000). Another look at classic strain theory: Poverty status,
perceived blocked opportunity, and gang membership as predictors of adolescent violent
behaviour. Sociological Inquiry, 70(1), 42-60.
 Watson, S. L., Loizzo, J., Watson, W. R., Mueller, C., Lim, J., &Ertmer, P. A. (2016).
Instructional design, facilitation, and perceived learning outcomes: An exploratory case
study of a human trafficking MOOC for attitudinal change. Educational Technology
Research and Development, 64(6), 1273-1300.
 Williams, P. (2004). Transnational criminal organisations and international security.
Survival, 36(1), 96-113.
 Winterdyk, J., & Reichel, P. (2010). Introduction to special issue: human trafficking:
issues and perspectives.
 Worth, S., Erwin, M. E., Jones, R. N., & Quality Control Study Group. (1996). Quality
control guidelines for amoxicillin,

55
APPENDICES

56
Appendix I: STRUCTURED QUESTIONNAIRES FOR INHABITANTS OF GASABO
DISTRICT
RE: Asking for information for research project

Informed consent form

I ………………………., a final year student at University of Rwanda, College of Arts and


Social Science (CASS), in department of Professional Police Studies carrying out a research
entitled “Assessing the impact of information technology on human trafficking in Rwanda, a
case study of Gasabo district”. To this end, I hereby request you to provide me with
information associated to this study which apparently falls in your field of work. The
information provided is meant for academic purposes and therefore it will be treated with
supreme confidence it deserves. Please try to answer this questionnaire as freely and fairly as
possible. Your cooperation and contribution will be highly appreciated.

INSTRUCTIONS

Circle the corresponding number of your choice

Attempt all questions

SECTION I: BACKGROUND AND CHARACTERISTICS

Qn: 101 Record genders of yours

1. Male

2. Female

Qn: 102 What is your educational level

1. Primary education

2. Secondary educational (A2)

3. University education (A0)

4. Master’s degree and above

Qn: 103 What is your age group

1. Below 21 years
2. 21 years -30 years

57
3. 31 years – 40 years
4. 41 years and above
Qn:104: Select your marital status

1. Single

2. Married

3. Divorced

4. Widows

5. Widower

SECTION II: GENERAL INFORMATION ON HUMAN TRAFFICKING

Qn 201Among the following potential causes of human trafficking, which one is the
most prevalent in your area?

1. Poverty
2. Armed conflicts/ disasters and Political instability
3. Globalization and global demand for cheap labor
4. Organized criminal syndicates and human trafficking
5. Corruption, political instabilities and human trafficking
6. Growth of global commercial sex market

Qn: 202 Do you know what human trafficking means?

1. Yes

2. No

Qn 203: Knowing what H T is, which one of the following types of human trafficking is
the most prevailing in Rwanda?

1. Sex trafficking

2. Labor trafficking

3. Debt bondage

58
4. Involuntary domestic servitude

Qn 204: Which one of the following forms of human trafficking existing in Rwanda is
highly influenced by technology?

1. Child Labour

2. Child sex trafficking

3. Debt bondage

4. Involuntary domestic servitude

Qn205. Which one of the following technological tools influences most human
trafficking crimes?

a.Mobile phones

b. Desktops, laptops, tablets

c. Camera and video technologies and associated outputs

d. Television

e. Online dating sites

f. Dark-web and Applications

Qn 206. Select the most important strategy among the following ICT based strategies to
eradicate human trafficking

a. Training law enforcement officials to identify and respond to cases of HT

b. E-learning training programs to raise awareness

c. Facial reconstruction technologies in human trafficking cases

d. Alerting people the risks associated with the use of technology

e. Financial tracking

APPENDIX II: Interview guide with the victims of human trafficking


Interview Date:

59
Topic: Assessing the impact of information technology on human trafficking in Rwanda, a
case study of Gasabo district

Target Audience: Human trafficking victims

Principal Investigator: …………………………………..

Total Participant: 15 participants

Time required: 2hours 30 minutes

I. DISCUSSION GUIDELINES:

The researcher would like to encourage you to respond directly to the asked question.

If you don’t understand a question, please let the researcher know.

Hopefully you’ll feel free to speak openly and honestly.

As discussed, the interview will be tape recorded in order not to miss any of your comments.

No one else will have access to these tapes and they will be destroyed after our report
compiled.

II. QUESTIONS

5. How were you seduced into human trafficking…………………………………………..?


6. What do you think are the potential causes of human trafficking in Rwanda…………….?
7. What are the major types and forms of HT are practiced in this area……………………..?
8. What technological tool were you using while contacting with traffickers……………….?
9. How can you escape human trafficking deceits using technology………………………..?

60
APPENDIX III: Interview guide with the law enforcement officials

Interview Date:

Topic: Assessing the impact of information technology on human trafficking in Rwanda, a


case study of Gasabo district

Target Audience: Law enforcement officials

Principal Investigator: ……………………………….

Total Participant: 13 participants and time required: 2hours 20 minutes

I. DISCUSSION GUIDELINES:

The researcher would like to encourage you to respond directly to the asked question.

If you don’t understand a question, please let the researcher know.

Hopefully you’ll feel free to speak openly and honestly.

As discussed, the interview will be tape recorded in order not to miss any of your comments.

No one else will have access to these tapes and they will be destroyed after our report is
written.

II. QUESTIONS

10. What is the state of human trafficking in Gasabo district…………………………………?


11. What do you think are the potential causes of human trafficking in this area…………….?
12. What are the main types and forms of human trafficking most dominant in this area…….?
13. How does technology influence human trafficking according to you……………………..?
14. What technological tools that facilitate human trafficking and how………………………?
15. How can technology play part in fighting against human trafficking……………………..?

61
RESEARCH PERMISSION LETTERS

62

You might also like