Labour trafficking in Chinese restaurants in the Netherlands and the role of Dutch immigration policies: A qualitative analysis of investigative case files

Masja van Meeteren*, Ellen Wiering

*Corresponding author for this work

Research output: Contribution to JournalArticleAcademicpeer-review

Abstract

Scholars have found that many migrants are vulnerable to exploitation and that there are many immigrants among victims of extreme forms of labour exploitation. In the Global North, empirical studies have scrutinized the link between irregular migration and labour trafficking, yet empirical studies that focus on labour schemes involving regular migrants remain scarce. Drawing on a qualitative analysis of 8 investigative police files of labour trafficking involving regular migrants in the Chinese catering industry in the Netherlands, this study investigates the mechanisms through which exploitation comes about and is sustained. It is concluded that exploitation is the result of the ways in which both the employers and the victims manoeuvre the space provided by immigration policies. Employer-bounded residence and work permits emerged as an especially important contributor to the initiation and continuation of exploitative situations. Policymakers should be highly aware of the vulnerabilities of temporary labour migrants’ positions created by such policy arrangements. Future research is needed in order to create a better understanding of how exploitative work situations develop and are sustained, and the role different factors such as immigration policies play in such processes.

Original languageEnglish
Pages (from-to)107-124
Number of pages18
JournalCrime, Law and Social Change
Volume72
DOIs
Publication statusPublished - 3 Aug 2019

Funding

FundersFunder number
Nederlandse Organisatie voor Wetenschappelijk Onderzoek451-15-025

    Fingerprint

    Dive into the research topics of 'Labour trafficking in Chinese restaurants in the Netherlands and the role of Dutch immigration policies: A qualitative analysis of investigative case files'. Together they form a unique fingerprint.

    Cite this