Drones and child labor trafficking: using modern technology as a tool against exploitation

Research output: Contribution to book or proceedingChapterpeer-review

Abstract

Though states and NGOs have spent decades attempting to stop child labor trafficking, progress has been slow, and many efforts have failed. As the security realm becomes more and more technologically advanced, many experts are beginning to suggest new ways of thinking about solutions to global security problems, solutions that adopt new technologies as well as new theoretical approaches. In the chapter to follow, I discuss the potentially fruitful application of drones to tracking and stopping child labor trafficking. I begin by giving a brief overview of drone technology and some of the various uses of drones, followed by some information on the human rights concerns surrounding drone use. I then discuss the problem of child labor trafficking, the challenges to addressing this criminal enterprise, and the important differences between children’s rights and rights for adults. Finally, I bring together these discussions and explain how drone technology could specifically aid in investigating and punishing child labor trafficking, with the understanding that children also have human rights that must be protected. I end the chapter with a brief consideration of possible avenues for future work in this research area.

Original languageEnglish
Title of host publicationInternational Security Studies and Technology
Subtitle of host publicationApproaches, Assessments, and Frontiers
PublisherEdward Elgar Publishing Ltd.
Pages120-138
Number of pages19
ISBN (Electronic)9781035336241
ISBN (Print)9781035336234
DOIs
StatePublished - Jan 1 2024
Externally publishedYes

Scopus Subject Areas

  • General Social Sciences
  • General Engineering

Keywords

  • Child labor
  • Child trafficking
  • Children
  • Drones
  • NGOs
  • Security
  • Technology

Fingerprint

Dive into the research topics of 'Drones and child labor trafficking: using modern technology as a tool against exploitation'. Together they form a unique fingerprint.

Cite this