Home / Regular Issue / JTAS Vol. 22 (S) Jan. 2014 / JSSH-0973-2013


Internet: The Double-Edged Sword of Trafficking of Women in Malaysia

Olivia Tan Swee Leng, Shereen Khan and Rohani Abd Rahim

Pertanika Journal of Tropical Agricultural Science, Volume 22, Issue S, January 2014

Keywords: Trafficking of women, Information Communication Technologies, Abuse of technology

Published on:

Trafficking in persons is a major concern for global nations. The technology, growth, and usage of information and communication technologies (ICTs) have been accompanied by an increase in exploitation and abuse of technology for criminal activities. With regards to cyberspace, the Internet is increasingly used as a tool and medium by transnational organized crime. Trafficking in women is an obvious form of organized crime that has been affected by the globalised revolution in ICT. This illegal trafficking is not exclusive to sexual exploitation with respect to women or child trafficking, but also covers indentured servitude and child labour. This new form of crime violates fundamental and basic human rights and freedom, and transcends national boundaries and territories to negatively impact on numerous countries across the world. It is estimated that over 900,000 people are being trafficked every year1. This paper seeks to discuss, address and analyze the impact of Information Communication Technologies (ICTs) on trafficking in women for sexual exploitation. Such trafficking is a major criminal activity and a blatant evil that should be effectively tackled on all levels. An analysis of the existing legislative and regulatory framework and their efficiency in the Asian region to combat this form of cross-border organized crime was made and the difference between trafficking and smuggling as stated in the Anti-Trafficking of Persons Act 2007in Malaysia was discussed.The methodology for this research is qualitative research based on case-study and secondary data collected from government agencies. The paper concludes by discussing the steps that should be taken to protect human rights and minimize the risk of using ICTs in illegal criminal activities, especially with respect to trafficking in persons.

ISSN 1511-3701

e-ISSN 2231-8542

Article ID


Download Full Article PDF

Share this article

Recent Articles