142
CHAPTER 11
ICT as a protection tool against child exploitation
victims of cross-border trafficking would be helpful. The research goes on to propose
that the MCA would have a role in actively supporting prosecution. While these are
all desirable, it is overly ambitious and unnecessary to try to coordinate all these
activities in one technological system or database. Instead, in-country (national) sys-
tems need to be strengthened to address areas like child welfare and justice. Each
case recorded in the cross-border response system should remain open until the
child’s rights and needs are known to have been fully met. This can take many years
and may span a series of interventions including shelter home (
Figure 11.2
).
The report draws a conclusion that indicates the requirement for a technological
solution, and provides a strategy for delivering this, but reiterates the complex social,
economic, legal, and political setting in which such technology needs to, and will be,
deployed.
This recognition leads us back to the three key issues identified at the outset.
• Information and awareness about the issues
• Legal framework and difficulties dealing with cross border issues and globally
agreed methods of working
• Technical challenges (information flow, access and processing)
CBCT RESPONSE SYSTEM
One of the options considered by the research was a centralized CBCT response
system dedicated to addressing the needs of children who have been trafficked across
a border. For this, a regional database, with effective national alerting mechanisms,
needs to be put in place. Members of the public, community centers, etc., can report
missing children; these are initially investigated by the police in the source coun-
try, who can then activate in-country and cross-border alert requests through the
centralized regional system, on the basis of their analysis of a missing child report.
This model focuses specifically on cross-border trafficking of children.
Hacking
Viruses and worms
Vandalism
Theft and fraud
Danial of service attacks
Theft of data
Copying data
Alteration of data
Hardware failure
Software failure
Tapping
Sniffing
Message alteration
Theft and fraud
Unauthorised
access
errors
Clients (users)
Communication lines
Servers
Hardware, Operating Systems,
Application Software
FIGURE 11.2
Security challenges and vulnerabilities in a typical MCA network.
Do'stlaringiz bilan baham: |