Is it all going to waste? Illegal transports of e-waste in a European trade hub

被引:49
作者
Bisschop, Lieselot [1 ,2 ]
机构
[1] Univ Coll Ghent, Fac Business & Publ Adm, Ghent, Belgium
[2] Univ Ghent, Dept Criminal Law & Criminol, B-9000 Ghent, Belgium
关键词
CRIME; GREEN;
D O I
10.1007/s10611-012-9383-0
中图分类号
DF [法律]; D9 [法律];
学科分类号
0301 ;
摘要
This article responds to the call for more empirical knowledge about transnational environmental crime. It does so by analysing the case of illegal transports of electronic waste (e-waste) in a European trade hub. Given the complexity and global nature of transnational environmental crime, it is difficult to determine which actors are involved. In this regard, a local research setting allows the actors involved in illegal transports of e-waste to be identified. This research tries to determine whether these actors and their roles can be considered legal or illegal and illustrates the legal-illegal interfaces in e-waste flows. Moreover, this case study analyses the push, pull and facilitating factors and therefore looks at what motivations and opportunities shape the flows of e-waste in locations of origin, transit and destination. The results show that the social organisation and emergence of transnational environmental crime is on a thin line between legal and illegal which needs to be contextualised within the global reality of the locations of origin, transit and destination.
引用
收藏
页码:221 / 249
页数:29
相关论文
共 106 条
[1]   Analysing a world in motion - Globol flows meet 'criminology of the other' [J].
Aas, Katja Franko .
THEORETICAL CRIMINOLOGY, 2007, 11 (02) :283-303
[2]  
Amoyaw-Osei Y, 2011, GHANA E WASTE COUNTR, pi
[3]  
[Anonymous], INT HAZ WAST INSP PR
[4]  
[Anonymous], IMPEL TSF THREAT ASS
[5]  
[Anonymous], CRIMINOLOGY
[6]  
[Anonymous], LAATSTE NIEUWS 0209
[7]  
[Anonymous], 1994, Designing Social Inquiry: Scientific Inference in Qualitative Research
[8]  
[Anonymous], UNEP ENV AL B
[9]  
[Anonymous], 2005, The digital dump: exporting re-use and abuse to Africa
[10]  
[Anonymous], 2003, Security Journal, DOI https://doi.org/10.1057/palgrave