How (re) integration success and (re) integration failure is conceptualised in different contexts for women trafficked for the purpose of sexual exploitation

B Meshkovska, AER Bos, M Siegel

Research output: Contribution to journalArticleAcademicpeer-review

Abstract

In order to adequately meet the (re) integration needs of trafficked persons, it is important to first determine how success and failure of the (re) integration process is conceptualised in post-trafficking situations. We answer this question by looking at the feedback given by service providers (N = 40) when asked what they consider to be successful (re) integration, and what they consider to be a failed (re) integration process, based on their experiences with women trafficked for the purpose of sexual exploitation in Europe. This paper first provides an overview of the different dimensions of the (re) integration process: economic, institutional and social. It also situates the concept of recovery as applied in the context of post-trafficking situations within the overall framework of (re) integration. It concludes with a discussion of particular cases of successes and failures of the (re) integration process of trafficked persons. We find that rather than speaking of definitive success of the (re) integration process, it is much closer to what happens in practice to speak of the continuum of success along different dimensions. Finally, a failure of the process is found to be when a woman returns to a situation of exploitation, or when regression or re-trafficking occurs.
Original languageEnglish
Pages (from-to)155-169
Number of pages15
JournalInternational Review of Victimology
Volume29
Issue number2
DOIs
Publication statusPublished - May 2023

Keywords

  • (Re) integration
  • female trafficking
  • human trafficking
  • qualitative
  • sexual exploitation

Fingerprint

Dive into the research topics of 'How (re) integration success and (re) integration failure is conceptualised in different contexts for women trafficked for the purpose of sexual exploitation'. Together they form a unique fingerprint.

Cite this